1
|
#!/bin/sh
|
2
|
#
|
3
|
# builder_common.sh
|
4
|
#
|
5
|
# Copyright (c) 2004-2015 Electric Sheep Fencing, LLC
|
6
|
# Copyright (C) 2014 Ermal Luçi
|
7
|
# All rights reserved.
|
8
|
#
|
9
|
# NanoBSD portions of the code
|
10
|
# Copyright (c) 2005 Poul-Henning Kamp.
|
11
|
# and copied from nanobsd.sh
|
12
|
# All rights reserved.
|
13
|
#
|
14
|
# FreeSBIE portions of the code
|
15
|
# Copyright (c) 2005 Dario Freni
|
16
|
# and copied from FreeSBIE project
|
17
|
# All rights reserved.
|
18
|
#
|
19
|
# Redistribution and use in source and binary forms, with or without
|
20
|
# modification, are permitted provided that the following conditions
|
21
|
# are met:
|
22
|
#
|
23
|
# 1. Redistributions of source code must retain the above copyright
|
24
|
# notice, this list of conditions and the following disclaimer.
|
25
|
#
|
26
|
# 2. Redistributions in binary form must reproduce the above copyright
|
27
|
# notice, this list of conditions and the following disclaimer in the
|
28
|
# documentation and/or other materials provided with the distribution.
|
29
|
#
|
30
|
# THIS SOFTWARE IS PROVIDED BY THE pfSense PROJECT ``AS IS'' AND ANY
|
31
|
# EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
32
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
33
|
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE pfSense PROJECT OR
|
34
|
# ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
35
|
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
36
|
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
37
|
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
38
|
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
39
|
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
40
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
41
|
# OF THE POSSIBILITY OF SUCH DAMAGE.
|
42
|
# Redistribution and use in source and binary forms, with or without
|
43
|
# modification, are permitted provided that the following conditions are met:
|
44
|
#
|
45
|
|
46
|
if [ -n "${IMAGES_FINAL_DIR}" -a "${IMAGES_FINAL_DIR}" != "/" ]; then
|
47
|
mkdir -p ${IMAGES_FINAL_DIR}
|
48
|
else
|
49
|
echo "IMAGES_FINAL_DIR is not defined"
|
50
|
print_error_pfS
|
51
|
fi
|
52
|
|
53
|
lc() {
|
54
|
echo "${1}" | tr '[[:upper:]]' '[[:lower:]]'
|
55
|
}
|
56
|
|
57
|
git_last_commit() {
|
58
|
export CURRENT_COMMIT=$(git -C ${BUILDER_ROOT} log -1 --format='%H')
|
59
|
export CURRENT_AUTHOR=$(git -C ${BUILDER_ROOT} log -1 --format='%an')
|
60
|
echo ">>> Last known commit $CURRENT_AUTHOR - $CURRENT_COMMIT"
|
61
|
echo "$CURRENT_COMMIT" > $SCRATCHDIR/build_commit_info.txt
|
62
|
}
|
63
|
|
64
|
# Create core pkg repository
|
65
|
core_pkg_create_repo() {
|
66
|
if [ ! -d "${CORE_PKG_REAL_PATH}/All" ]; then
|
67
|
return
|
68
|
fi
|
69
|
|
70
|
############ ATTENTION ##############
|
71
|
#
|
72
|
# For some reason pkg-repo fail without / in the end of directory name
|
73
|
# so removing it will break command
|
74
|
#
|
75
|
# https://github.com/freebsd/pkg/issues/1364
|
76
|
#
|
77
|
echo -n ">>> Creating core packages repository... "
|
78
|
if pkg repo -q "${CORE_PKG_REAL_PATH}/"; then
|
79
|
echo "Done!"
|
80
|
else
|
81
|
echo "Failed!"
|
82
|
print_error_pfS
|
83
|
fi
|
84
|
|
85
|
# Use the same directory structure as poudriere does to avoid
|
86
|
# breaking snapshot repositories during rsync
|
87
|
ln -sf $(basename ${CORE_PKG_REAL_PATH}) ${CORE_PKG_PATH}/.latest
|
88
|
ln -sf .latest/All ${CORE_PKG_PATH}/All
|
89
|
ln -sf .latest/digests.txz ${CORE_PKG_PATH}/digests.txz
|
90
|
ln -sf .latest/meta.txz ${CORE_PKG_PATH}/meta.txz
|
91
|
ln -sf .latest/packagesite.txz ${CORE_PKG_PATH}/packagesite.txz
|
92
|
}
|
93
|
|
94
|
# Create core pkg (base, kernel)
|
95
|
core_pkg_create() {
|
96
|
local _template="${1}"
|
97
|
local _flavor="${2}"
|
98
|
local _version="${3}"
|
99
|
local _root="${4}"
|
100
|
local _filter="${5}"
|
101
|
|
102
|
[ -d "${CORE_PKG_TMP}" ] \
|
103
|
&& rm -rf ${CORE_PKG_TMP}
|
104
|
|
105
|
local _templates_path=${BUILDER_TOOLS}/templates/core_pkg/${_template}
|
106
|
local _template_metadir=${_templates_path}/metadir
|
107
|
local _metadir=${CORE_PKG_TMP}/${_template}_metadir
|
108
|
|
109
|
if [ ! -d ${_template_metadir} ]; then
|
110
|
echo "ERROR: Template dir not found for pkg ${_template}"
|
111
|
exit
|
112
|
fi
|
113
|
|
114
|
mkdir -p ${CORE_PKG_TMP}
|
115
|
|
116
|
cp -r ${_template_metadir} ${_metadir}
|
117
|
|
118
|
local _manifest=${_metadir}/+MANIFEST
|
119
|
local _plist=${CORE_PKG_TMP}/${_template}_plist
|
120
|
local _exclude_plist=${CORE_PKG_TMP}/${_template}_exclude_plist
|
121
|
|
122
|
if [ -f "${_templates_path}/pkg-plist" ]; then
|
123
|
cp ${_templates_path}/pkg-plist ${_plist}
|
124
|
else
|
125
|
if [ -n "${_filter}" ]; then
|
126
|
_filter="-name ${_filter}"
|
127
|
fi
|
128
|
(cd ${_root} && find . ${_filter} -type f -or -type l | sed 's,^.,,' | sort -u) > ${_plist}
|
129
|
fi
|
130
|
|
131
|
if [ -f "${_templates_path}/exclude_plist" ]; then
|
132
|
cp ${_templates_path}/exclude_plist ${_exclude_plist}
|
133
|
else
|
134
|
touch ${_exclude_plist}
|
135
|
fi
|
136
|
|
137
|
sed \
|
138
|
-i '' \
|
139
|
-e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" \
|
140
|
-e "s,%%PRODUCT_URL%%,${PRODUCT_URL},g" \
|
141
|
-e "s,%%FLAVOR%%,${_flavor:+-}${_flavor},g" \
|
142
|
-e "s,%%FLAVOR_DESC%%,${_flavor:+ (${_flavor})},g" \
|
143
|
-e "s,%%VERSION%%,${_version},g" \
|
144
|
${_metadir}/* \
|
145
|
${_plist} \
|
146
|
${exclude_plist}
|
147
|
|
148
|
if [ -f "${_exclude_plist}" ]; then
|
149
|
sort -u ${_exclude_plist} > ${_plist}.exclude
|
150
|
mv ${_plist} ${_plist}.tmp
|
151
|
comm -23 ${_plist}.tmp ${_plist}.exclude > ${_plist}
|
152
|
rm -f ${_plist}.tmp ${plist}.exclude
|
153
|
fi
|
154
|
|
155
|
# Add license information
|
156
|
local _portname=$(sed '/^name: /!d; s,^[^"]*",,; s,",,' ${_metadir}/+MANIFEST)
|
157
|
local _licenses_dir="/usr/local/share/licenses/${_portname}-${_version}"
|
158
|
mkdir -p ${_root}${_licenses_dir}
|
159
|
cp ${BUILDER_ROOT}/license.txt ${_root}${_licenses_dir}/ESF
|
160
|
echo "This package has a single license: ESF (Electric Sheep Fencing License)." \
|
161
|
> ${_root}${_licenses_dir}/LICENSE
|
162
|
cat <<EOF >${_root}${_licenses_dir}/catalog.mk
|
163
|
_LICENSE=ESF
|
164
|
_LICENSE_NAME=Electric Sheep Fencing License
|
165
|
_LICENSE_PERMS=dist-mirror dist-sell pkg-mirror pkg-sell auto-accept
|
166
|
_LICENSE_GROUPS=
|
167
|
_LICENSE_DISTFILES=
|
168
|
EOF
|
169
|
cat <<EOF >>${_plist}
|
170
|
${_licenses_dir}/catalog.mk
|
171
|
${_licenses_dir}/LICENSE
|
172
|
${_licenses_dir}/ESF
|
173
|
EOF
|
174
|
|
175
|
mkdir -p ${CORE_PKG_REAL_PATH}/All
|
176
|
if ! pkg create -o ${CORE_PKG_REAL_PATH}/All -p ${_plist} -r ${_root} -m ${_metadir}; then
|
177
|
echo ">>> ERROR: Error building package ${_template} ${_flavor}"
|
178
|
print_error_pfS
|
179
|
fi
|
180
|
}
|
181
|
|
182
|
# This routine will output that something went wrong
|
183
|
print_error_pfS() {
|
184
|
echo
|
185
|
echo "####################################"
|
186
|
echo "Something went wrong, check errors!" >&2
|
187
|
echo "####################################"
|
188
|
echo
|
189
|
echo "NOTE: a lot of times you can run './build.sh --clean-builder' to resolve."
|
190
|
echo
|
191
|
if [ "$1" != "" ]; then
|
192
|
echo $1
|
193
|
fi
|
194
|
[ -n "${LOGFILE}" -a -f "${LOGFILE}" ] && \
|
195
|
echo "Log saved on ${LOGFILE}" && \
|
196
|
tail -n20 ${LOGFILE} >&2
|
197
|
echo
|
198
|
kill $$
|
199
|
exit 1
|
200
|
}
|
201
|
|
202
|
prestage_on_ram_setup() {
|
203
|
# Do not use memory disks for release build
|
204
|
if [ -n "${_IS_RELEASE}" ]; then
|
205
|
return
|
206
|
fi
|
207
|
|
208
|
[ -d "${STAGE_CHROOT_DIR}" ] \
|
209
|
|| mkdir -p ${STAGE_CHROOT_DIR}
|
210
|
[ -d "${FINAL_CHROOT_DIR}" ] \
|
211
|
|| mkdir -p ${FINAL_CHROOT_DIR}
|
212
|
|
213
|
_AVAIL_MEM=$(($(sysctl -n hw.usermem) / 1024 / 1024))
|
214
|
if [ $_AVAIL_MEM -lt 2000 ]; then
|
215
|
echo ">>> Builder has less than 2GiB RAM skipping memory disks"
|
216
|
return
|
217
|
else
|
218
|
echo "######################################################################################"
|
219
|
echo
|
220
|
echo ">>> Builder has more than 2GiB RAM enabling memory disks"
|
221
|
echo ">>> WARNING: Remember to remove these memory disks by running $0 --disable-memorydisks"
|
222
|
echo
|
223
|
echo "######################################################################################"
|
224
|
fi
|
225
|
|
226
|
if df /dev/ufs/prestagebacking >/dev/null 2>&1; then
|
227
|
echo ">>> Detected preexisting memory disk enabled for ${STAGE_CHROOT_DIR}."
|
228
|
else
|
229
|
mdconfig -a -t swap -u 10001 -s ${MEMORYDISK_SIZE}
|
230
|
newfs -L prestagebacking -U /dev/md10001
|
231
|
mount /dev/ufs/prestagebacking ${STAGE_CHROOT_DIR}
|
232
|
fi
|
233
|
|
234
|
if df /dev/ufs/finalstagebacking >/dev/null 2>&1; then
|
235
|
echo ">>> Detected preexisting memory disk enabled for ${FINAL_CHROOT_DIR}."
|
236
|
else
|
237
|
mdconfig -a -t swap -u 10002 -s ${MEMORYDISK_SIZE}
|
238
|
newfs -L finalstagebacking -U /dev/md10002
|
239
|
mount /dev/ufs/finalstagebacking ${FINAL_CHROOT_DIR}
|
240
|
fi
|
241
|
}
|
242
|
|
243
|
prestage_on_ram_cleanup() {
|
244
|
if [ -c /dev/md10001 ]; then
|
245
|
if [ -d ${STAGE_CHROOT_DIR} ]; then
|
246
|
umount ${STAGE_CHROOT_DIR}
|
247
|
fi
|
248
|
mdconfig -d -u 10001
|
249
|
fi
|
250
|
if [ -c /dev/md10002 ]; then
|
251
|
if [ -d ${FINAL_CHROOT_DIR} ]; then
|
252
|
umount ${FINAL_CHROOT_DIR}
|
253
|
fi
|
254
|
mdconfig -d -u 10002
|
255
|
fi
|
256
|
}
|
257
|
|
258
|
# This routine will verify that the kernel has been
|
259
|
# installed OK to the staging area.
|
260
|
ensure_kernel_exists() {
|
261
|
if [ ! -f "$1/boot/kernel/kernel.gz" ]; then
|
262
|
echo ">>> ERROR: Could not locate $1/boot/kernel.gz"
|
263
|
print_error_pfS
|
264
|
fi
|
265
|
KERNEL_SIZE=$(stat -f "%z" $1/boot/kernel/kernel.gz)
|
266
|
if [ "$KERNEL_SIZE" -lt 3500 ]; then
|
267
|
echo ">>> ERROR: Kernel $1/boot/kernel.gz appears to be smaller than it should be: $KERNEL_SIZE"
|
268
|
print_error_pfS
|
269
|
fi
|
270
|
}
|
271
|
|
272
|
get_pkg_name() {
|
273
|
echo "${PRODUCT_NAME}-${1}-${CORE_PKG_VERSION}"
|
274
|
}
|
275
|
|
276
|
# This routine builds all related kernels
|
277
|
build_all_kernels() {
|
278
|
# Set KERNEL_BUILD_PATH if it has not been set
|
279
|
if [ -z "${KERNEL_BUILD_PATH}" ]; then
|
280
|
KERNEL_BUILD_PATH=$SCRATCHDIR/kernels
|
281
|
echo ">>> KERNEL_BUILD_PATH has not been set. Setting to ${KERNEL_BUILD_PATH}!"
|
282
|
fi
|
283
|
|
284
|
[ -d "${KERNEL_BUILD_PATH}" ] \
|
285
|
&& rm -rf ${KERNEL_BUILD_PATH}
|
286
|
|
287
|
# Build embedded kernel
|
288
|
for BUILD_KERNEL in $BUILD_KERNELS; do
|
289
|
unset KERNCONF
|
290
|
unset KERNEL_DESTDIR
|
291
|
unset KERNELCONF
|
292
|
unset KERNEL_NAME
|
293
|
export KERNCONF=$BUILD_KERNEL
|
294
|
export KERNEL_DESTDIR="$KERNEL_BUILD_PATH/$BUILD_KERNEL"
|
295
|
export KERNELCONF="${FREEBSD_SRC_DIR}/sys/${TARGET}/conf/$BUILD_KERNEL"
|
296
|
export KERNEL_NAME=${BUILD_KERNEL}
|
297
|
|
298
|
LOGFILE="${BUILDER_LOGS}/kernel.${KERNCONF}.${TARGET}.log"
|
299
|
echo ">>> Building $BUILD_KERNEL kernel." | tee -a ${LOGFILE}
|
300
|
|
301
|
if [ ! -e "${FREEBSD_SRC_DIR}/sys/${TARGET}/conf/${BUILD_KERNEL}" ]; then
|
302
|
echo ">>> ERROR: Could not find $KERNELCONF"
|
303
|
print_error_pfS
|
304
|
fi
|
305
|
|
306
|
if [ -n "${NO_BUILDKERNEL}" -a -f "${CORE_PKG_REAL_PATH}/All/$(get_pkg_name kernel-${KERNEL_NAME}).txz" ]; then
|
307
|
echo ">>> NO_BUILDKERNEL set, skipping build" | tee -a ${LOGFILE}
|
308
|
continue
|
309
|
fi
|
310
|
|
311
|
export SRC_CONF=${SRC_CONF}
|
312
|
buildkernel
|
313
|
|
314
|
echo ">>> Staging $BUILD_KERNEL kernel..." | tee -a ${LOGFILE}
|
315
|
installkernel
|
316
|
|
317
|
ensure_kernel_exists $KERNEL_DESTDIR
|
318
|
|
319
|
echo -n ">>> Creating pkg of $KERNEL_NAME-debug kernel to staging area... " | tee -a ${LOGFILE}
|
320
|
core_pkg_create kernel-debug ${KERNEL_NAME} ${CORE_PKG_VERSION} ${KERNEL_DESTDIR} \*.symbols
|
321
|
find ${KERNEL_DESTDIR} -name '*.symbols' -type f -delete
|
322
|
echo " Done" | tee -a ${LOGFILE}
|
323
|
|
324
|
echo -n ">>> Creating pkg of $KERNEL_NAME kernel to staging area... " | tee -a ${LOGFILE}
|
325
|
core_pkg_create kernel ${KERNEL_NAME} ${CORE_PKG_VERSION} ${KERNEL_DESTDIR}
|
326
|
|
327
|
rm -rf $KERNEL_DESTDIR 2>&1 1>/dev/null
|
328
|
|
329
|
echo " Done" | tee -a ${LOGFILE}
|
330
|
done
|
331
|
}
|
332
|
|
333
|
install_default_kernel() {
|
334
|
if [ -z "${1}" ]; then
|
335
|
echo ">>> ERROR: install_default_kernel called without a kernel config name"| tee -a ${LOGFILE}
|
336
|
print_error_pfS
|
337
|
fi
|
338
|
|
339
|
export KERNEL_NAME="${1}"
|
340
|
|
341
|
echo -n ">>> Installing kernel to be used by image ${KERNEL_NAME}..." | tee -a ${LOGFILE}
|
342
|
|
343
|
# Copy kernel package to chroot, otherwise pkg won't find it to install
|
344
|
if ! pkg_chroot_add ${FINAL_CHROOT_DIR} kernel-${KERNEL_NAME}; then
|
345
|
echo ">>> ERROR: Error installing kernel package $(get_pkg_name kernel-${KERNEL_NAME}).txz" | tee -a ${LOGFILE}
|
346
|
print_error_pfS
|
347
|
fi
|
348
|
|
349
|
# Lock kernel to avoid user end up removing it for any reason
|
350
|
pkg_chroot ${FINAL_CHROOT_DIR} lock -q -y $(get_pkg_name kernel-${KERNEL_NAME})
|
351
|
|
352
|
if [ ! -f $FINAL_CHROOT_DIR/boot/kernel/kernel.gz ]; then
|
353
|
echo ">>> ERROR: No kernel installed on $FINAL_CHROOT_DIR and the resulting image will be unusable. STOPPING!" | tee -a ${LOGFILE}
|
354
|
print_error_pfS
|
355
|
fi
|
356
|
mkdir -p $FINAL_CHROOT_DIR/pkgs
|
357
|
if [ -z "${2}" -o -n "${INSTALL_EXTRA_KERNELS}" ]; then
|
358
|
cp ${CORE_PKG_REAL_PATH}/All/$(get_pkg_name kernel-${KERNEL_NAME}).txz $FINAL_CHROOT_DIR/pkgs
|
359
|
if [ -n "${INSTALL_EXTRA_KERNELS}" ]; then
|
360
|
for _EXTRA_KERNEL in $INSTALL_EXTRA_KERNELS; do
|
361
|
_EXTRA_KERNEL_PATH=${CORE_PKG_REAL_PATH}/All/$(get_pkg_name kernel-${_EXTRA_KERNEL}).txz
|
362
|
if [ -f "${_EXTRA_KERNEL_PATH}" ]; then
|
363
|
echo -n ". adding ${_EXTRA_KERNEL_PATH} on image /pkgs folder"
|
364
|
cp ${_EXTRA_KERNEL_PATH} $FINAL_CHROOT_DIR/pkgs
|
365
|
else
|
366
|
echo ">>> ERROR: Requested kernel $(get_pkg_name kernel-${_EXTRA_KERNEL}).txz was not found to be put on image /pkgs folder!"
|
367
|
print_error_pfS
|
368
|
fi
|
369
|
done
|
370
|
fi
|
371
|
fi
|
372
|
echo "Done." | tee -a ${LOGFILE}
|
373
|
|
374
|
unset KERNEL_NAME
|
375
|
}
|
376
|
|
377
|
# Creates a full update file
|
378
|
create_Full_update_tarball() {
|
379
|
mkdir -p $UPDATESDIR
|
380
|
|
381
|
customize_stagearea_for_image "fullupdate"
|
382
|
install_default_kernel ${DEFAULT_KERNEL}
|
383
|
|
384
|
rm -rf ${FINAL_CHROOT_DIR}/cf
|
385
|
rm -rf ${FINAL_CHROOT_DIR}/conf
|
386
|
rm -f ${FINAL_CHROOT_DIR}/etc/dh-parameters.*
|
387
|
rm -f ${FINAL_CHROOT_DIR}/etc/rc.conf
|
388
|
rm -f ${FINAL_CHROOT_DIR}/etc/pwd.db 2>/dev/null
|
389
|
rm -f ${FINAL_CHROOT_DIR}/etc/group 2>/dev/null
|
390
|
rm -f ${FINAL_CHROOT_DIR}/etc/spwd.db 2>/dev/null
|
391
|
rm -f ${FINAL_CHROOT_DIR}/etc/passwd 2>/dev/null
|
392
|
rm -f ${FINAL_CHROOT_DIR}/etc/master.passwd 2>/dev/null
|
393
|
rm -f ${FINAL_CHROOT_DIR}/etc/fstab 2>/dev/null
|
394
|
rm -f ${FINAL_CHROOT_DIR}/etc/bogons 2>/dev/null
|
395
|
# Remove loader.conf and friends. Ticket #560
|
396
|
rm ${FINAL_CHROOT_DIR}/boot/loader.conf 2>/dev/null
|
397
|
rm ${FINAL_CHROOT_DIR}/boot/loader.conf.local 2>/dev/null
|
398
|
|
399
|
# Old systems will run (pre|post)_upgrade_command from /tmp
|
400
|
if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command ]; then
|
401
|
cp -p \
|
402
|
${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command \
|
403
|
${FINAL_CHROOT_DIR}/tmp
|
404
|
fi
|
405
|
if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command ]; then
|
406
|
cp -p \
|
407
|
${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command \
|
408
|
${FINAL_CHROOT_DIR}/tmp
|
409
|
fi
|
410
|
|
411
|
echo ">>> Creating ${UPDATES_TARBALL_FILENAME} ..." | tee -a ${LOGFILE}
|
412
|
tar --exclude=./dev -czPf ${UPDATES_TARBALL_FILENAME} -C ${FINAL_CHROOT_DIR} .
|
413
|
}
|
414
|
|
415
|
# Outputs various set variables aka env
|
416
|
print_flags() {
|
417
|
|
418
|
echo
|
419
|
printf " Product version: %s\n" $PRODUCT_VERSION
|
420
|
printf " Stage DIR: %s\n" $STAGE_CHROOT_DIR
|
421
|
printf " Updates dir: %s\n" $UPDATESDIR
|
422
|
printf " Image Preparation Stage DIR: %s\n" $FINAL_CHROOT_DIR
|
423
|
printf " Source DIR: %s\n" $FREEBSD_SRC_DIR
|
424
|
printf " FreeBSD repository: %s\n" $FREEBSD_REPO_BASE
|
425
|
printf " FreeBSD-src branch: %s\n" $FREEBSD_BRANCH
|
426
|
printf " FreeBSD original branch: %s\n" $FREEBSD_PARENT_BRANCH
|
427
|
printf " BUILD_KERNELS: %s\n" $BUILD_KERNELS
|
428
|
printf " Git Branch or Tag: %s\n" $GIT_REPO_BRANCH_OR_TAG
|
429
|
printf " MODULES_OVERRIDE: %s\n" $MODULES_OVERRIDE
|
430
|
printf " VMDK_DISK_CAPACITY_IN_GB: %s\n" $VMDK_DISK_CAPACITY_IN_GB
|
431
|
printf " OVFTEMPLATE: %s\n" $OVFTEMPLATE
|
432
|
printf " OVFVMDK: %s\n" $OVFVMDK
|
433
|
printf " SRC_CONF: %s\n" $SRC_CONF
|
434
|
printf " ISOPATH: %s\n" $ISOPATH
|
435
|
printf " MEMSTICKPATH: %s\n" $MEMSTICKPATH
|
436
|
printf " UPDATES_TARBALL_FILENAME: %s\n" $UPDATES_TARBALL_FILENAME
|
437
|
if [ -n "$SHOW_ENV" ]; then
|
438
|
for LINE in $(env | egrep -v '(terminal|PASS|NAME|USER|SSH|GROUP|HOST)'); do
|
439
|
echo "SHOW_ENV: $LINE"
|
440
|
done
|
441
|
fi
|
442
|
echo
|
443
|
}
|
444
|
|
445
|
# This builds FreeBSD (make buildworld)
|
446
|
# Imported from FreeSBIE
|
447
|
make_world() {
|
448
|
|
449
|
LOGFILE=${BUILDER_LOGS}/buildworld.${TARGET}
|
450
|
if [ -n "${NO_BUILDWORLD}" ]; then
|
451
|
echo ">>> NO_BUILDWORLD set, skipping build" | tee -a ${LOGFILE}
|
452
|
return
|
453
|
fi
|
454
|
|
455
|
# Set SRC_CONF variable if it's not already set.
|
456
|
if [ -z "${SRC_CONF}" ]; then
|
457
|
echo ">>> SRC_CONF is unset make sure this is what you want!" | tee -a ${LOGFILE}
|
458
|
else
|
459
|
echo ">>> Setting SRC_CONF to $SRC_CONF" | tee -a ${LOGFILE}
|
460
|
fi
|
461
|
|
462
|
# Set default parameters
|
463
|
export MAKE_ARGS="${MAKEJ_WORLD} __MAKE_CONF=${MAKE_CONF} SRCCONF=${SRC_CONF} TARGET=${TARGET} TARGET_ARCH=${TARGET_ARCH}"
|
464
|
|
465
|
echo ">>> LOGFILE set to $LOGFILE." | tee -a ${LOGFILE}
|
466
|
makeargs="${MAKE_ARGS}"
|
467
|
echo ">>> Building world for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
468
|
echo ">>> Builder is running the command: env LOCAL_ITOOLS=\"${EXTRA_TOOLS}\" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} -DNO_CLEAN ${makeargs} buildworld" | tee -a ${LOGFILE}
|
469
|
(env LOCAL_ITOOLS="${EXTRA_TOOLS}" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} -DNO_CLEAN ${makeargs} buildworld || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
470
|
echo ">>> Building world for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
471
|
|
472
|
LOGFILE=${BUILDER_LOGS}/installworld.${TARGET}
|
473
|
echo ">>> LOGFILE set to $LOGFILE." | tee -a ${LOGFILE}
|
474
|
# Create if cleaned up
|
475
|
makeargs="${MAKE_ARGS} DESTDIR=${STAGE_CHROOT_DIR} WITHOUT_TOOLCHAIN=1"
|
476
|
echo ">>> Installing world for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
477
|
echo ">>> Builder is running the command: env LOCAL_ITOOLS=\"${EXTRA_TOOLS}\" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} installworld" | tee -a ${LOGFILE}
|
478
|
(env LOCAL_ITOOLS="${EXTRA_TOOLS}" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} installworld || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
479
|
echo ">>> Installing world for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
480
|
|
481
|
makeargs="${MAKE_ARGS} DESTDIR=${STAGE_CHROOT_DIR}"
|
482
|
echo ">>> Distribution world for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
483
|
echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} distribution " | tee -a ${LOGFILE}
|
484
|
(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} distribution || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
485
|
echo ">>> Distribution world for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
486
|
|
487
|
[ -d "${STAGE_CHROOT_DIR}/usr/local/bin" ] \
|
488
|
|| mkdir -p ${STAGE_CHROOT_DIR}/usr/local/bin
|
489
|
makeargs="${MAKE_ARGS} DESTDIR=${STAGE_CHROOT_DIR}"
|
490
|
echo ">>> Building and installing crypto tools and athstats for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
491
|
echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/crypto ${makeargs} clean all install " | tee -a ${LOGFILE}
|
492
|
(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/crypto ${makeargs} clean all install || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
493
|
echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} clean" | tee -a ${LOGFILE}
|
494
|
(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} clean || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
495
|
echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} all" | tee -a ${LOGFILE}
|
496
|
(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} all || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
497
|
echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} install" | tee -a ${LOGFILE}
|
498
|
(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} install || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
|
499
|
echo ">>> Building and installing crypto tools and athstats for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
|
500
|
|
501
|
unset makeargs
|
502
|
}
|
503
|
|
504
|
nanobsd_image_filename() {
|
505
|
local _size="$1"
|
506
|
local _type="$2"
|
507
|
local _upgrade="$3"
|
508
|
|
509
|
if [ -z "$_upgrade" ]; then
|
510
|
local _template=${NANOBSD_IMG_TEMPLATE}
|
511
|
else
|
512
|
local _template=${NANOBSD_UPGRADE_TEMPLATE}
|
513
|
fi
|
514
|
|
515
|
echo "$_template" | sed \
|
516
|
-e "s,%%SIZE%%,${_size},g" \
|
517
|
-e "s,%%TYPE%%,${_type},g"
|
518
|
|
519
|
return 0
|
520
|
}
|
521
|
|
522
|
# This routine originated in nanobsd.sh
|
523
|
nanobsd_set_flash_details () {
|
524
|
a1=$(echo $1 | tr '[:upper:]' '[:lower:]')
|
525
|
|
526
|
# Source:
|
527
|
# SanDisk CompactFlash Memory Card
|
528
|
# Product Manual
|
529
|
# Version 10.9
|
530
|
# Document No. 20-10-00038
|
531
|
# April 2005
|
532
|
# Table 2-7
|
533
|
# NB: notice math error in SDCFJ-4096-388 line.
|
534
|
#
|
535
|
case "${a1}" in
|
536
|
2048|2048m|2048mb|2g)
|
537
|
NANO_MEDIASIZE=$((1989999616/512))
|
538
|
;;
|
539
|
4096|4096m|4096mb|4g)
|
540
|
NANO_MEDIASIZE=$((3989999616/512))
|
541
|
;;
|
542
|
8192|8192m|8192mb|8g)
|
543
|
NANO_MEDIASIZE=$((7989999616/512))
|
544
|
;;
|
545
|
16384|16384m|16384mb|16g)
|
546
|
NANO_MEDIASIZE=$((15989999616/512))
|
547
|
;;
|
548
|
*)
|
549
|
echo "Unknown Flash capacity"
|
550
|
exit 2
|
551
|
;;
|
552
|
esac
|
553
|
|
554
|
NANO_HEADS=16
|
555
|
NANO_SECTS=63
|
556
|
|
557
|
echo ">>> [nanoo] $1"
|
558
|
echo ">>> [nanoo] NANO_MEDIASIZE: $NANO_MEDIASIZE"
|
559
|
echo ">>> [nanoo] NANO_HEADS: $NANO_HEADS"
|
560
|
echo ">>> [nanoo] NANO_SECTS: $NANO_SECTS"
|
561
|
echo ">>> [nanoo] NANO_BOOT0CFG: $NANO_BOOT0CFG"
|
562
|
}
|
563
|
|
564
|
# This routine originated in nanobsd.sh
|
565
|
create_nanobsd_diskimage () {
|
566
|
if [ -z "${1}" ]; then
|
567
|
echo ">>> ERROR: Type of image has not been specified"
|
568
|
print_error_pfS
|
569
|
fi
|
570
|
if [ -z "${2}" ]; then
|
571
|
echo ">>> ERROR: Size of image has not been specified"
|
572
|
print_error_pfS
|
573
|
fi
|
574
|
|
575
|
if [ "${1}" = "nanobsd" ]; then
|
576
|
# It's serial
|
577
|
export NANO_BOOTLOADER="boot/boot0sio"
|
578
|
elif [ "${1}" = "nanobsd-vga" ]; then
|
579
|
# It's vga
|
580
|
export NANO_BOOTLOADER="boot/boot0"
|
581
|
else
|
582
|
echo ">>> ERROR: Type of image to create unknown"
|
583
|
print_error_pfS
|
584
|
fi
|
585
|
|
586
|
if [ -z "${2}" ]; then
|
587
|
echo ">>> ERROR: Media size(s) not specified."
|
588
|
print_error_pfS
|
589
|
fi
|
590
|
|
591
|
if [ -z "${2}" ]; then
|
592
|
echo ">>> ERROR: FLASH_SIZE is not set."
|
593
|
print_error_pfS
|
594
|
fi
|
595
|
|
596
|
LOGFILE=${BUILDER_LOGS}/${1}.${TARGET}
|
597
|
# Prepare folder to be put in image
|
598
|
customize_stagearea_for_image "${1}"
|
599
|
install_default_kernel ${DEFAULT_KERNEL} "no"
|
600
|
|
601
|
echo ">>> Fixing up NanoBSD Specific items..." | tee -a ${LOGFILE}
|
602
|
|
603
|
echo "nanobsd" > $FINAL_CHROOT_DIR/etc/platform
|
604
|
|
605
|
local BOOTCONF=${FINAL_CHROOT_DIR}/boot.config
|
606
|
local LOADERCONF=${FINAL_CHROOT_DIR}/boot/loader.conf
|
607
|
|
608
|
if [ "${1}" = "nanobsd" ]; then
|
609
|
# Tell loader to use serial console early.
|
610
|
echo "-S115200 -h" >> ${BOOTCONF}
|
611
|
|
612
|
# Remove old console options if present.
|
613
|
[ -f "${LOADERCONF}" ] \
|
614
|
&& sed -i "" -Ee "/(console|boot_multicons|boot_serial|hint.uart)/d" ${LOADERCONF}
|
615
|
# Activate serial console+video console in loader.conf
|
616
|
echo 'loader_color="NO"' >> ${LOADERCONF}
|
617
|
echo 'beastie_disable="YES"' >> ${LOADERCONF}
|
618
|
echo 'boot_serial="YES"' >> ${LOADERCONF}
|
619
|
echo 'console="comconsole"' >> ${LOADERCONF}
|
620
|
echo 'comconsole_speed="115200"' >> ${LOADERCONF}
|
621
|
fi
|
622
|
echo 'autoboot_delay="5"' >> ${LOADERCONF}
|
623
|
|
624
|
# Old systems will run (pre|post)_upgrade_command from /tmp
|
625
|
if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command ]; then
|
626
|
cp -p \
|
627
|
${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command \
|
628
|
${FINAL_CHROOT_DIR}/tmp
|
629
|
fi
|
630
|
if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command ]; then
|
631
|
cp -p \
|
632
|
${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command \
|
633
|
${FINAL_CHROOT_DIR}/tmp
|
634
|
fi
|
635
|
|
636
|
for _NANO_MEDIASIZE in ${2}; do
|
637
|
if [ -z "${_NANO_MEDIASIZE}" ]; then
|
638
|
continue;
|
639
|
fi
|
640
|
|
641
|
echo ">>> building NanoBSD(${1}) disk image with size ${_NANO_MEDIASIZE} for platform (${TARGET})..." | tee -a ${LOGFILE}
|
642
|
echo "" > $BUILDER_LOGS/nanobsd_cmds.sh
|
643
|
|
644
|
IMG="${IMAGES_FINAL_DIR}/$(nanobsd_image_filename ${_NANO_MEDIASIZE} ${1})"
|
645
|
IMGUPDATE="${IMAGES_FINAL_DIR}/$(nanobsd_image_filename ${_NANO_MEDIASIZE} ${1} 1)"
|
646
|
|
647
|
nanobsd_set_flash_details ${_NANO_MEDIASIZE}
|
648
|
|
649
|
# These are defined in FlashDevice and on builder_default.sh
|
650
|
echo $NANO_MEDIASIZE \
|
651
|
$NANO_IMAGES \
|
652
|
$NANO_SECTS \
|
653
|
$NANO_HEADS \
|
654
|
$NANO_CODESIZE \
|
655
|
$NANO_CONFSIZE \
|
656
|
$NANO_DATASIZE |
|
657
|
awk '
|
658
|
{
|
659
|
printf "# %s\n", $0
|
660
|
|
661
|
# size of cylinder in sectors
|
662
|
cs = $3 * $4
|
663
|
|
664
|
# number of full cylinders on media
|
665
|
cyl = int ($1 / cs)
|
666
|
|
667
|
# output fdisk geometry spec, truncate cyls to 1023
|
668
|
if (cyl <= 1023)
|
669
|
print "g c" cyl " h" $4 " s" $3
|
670
|
else
|
671
|
print "g c" 1023 " h" $4 " s" $3
|
672
|
|
673
|
if ($7 > 0) {
|
674
|
# size of data partition in full cylinders
|
675
|
dsl = int (($7 + cs - 1) / cs)
|
676
|
} else {
|
677
|
dsl = 0;
|
678
|
}
|
679
|
|
680
|
# size of config partition in full cylinders
|
681
|
csl = int (($6 + cs - 1) / cs)
|
682
|
|
683
|
if ($5 == 0) {
|
684
|
# size of image partition(s) in full cylinders
|
685
|
isl = int ((cyl - dsl - csl) / $2)
|
686
|
} else {
|
687
|
isl = int (($5 + cs - 1) / cs)
|
688
|
}
|
689
|
|
690
|
# First image partition start at second track
|
691
|
print "p 1 165 " $3, isl * cs - $3
|
692
|
c = isl * cs;
|
693
|
|
694
|
# Second image partition (if any) also starts offset one
|
695
|
# track to keep them identical.
|
696
|
if ($2 > 1) {
|
697
|
print "p 2 165 " $3 + c, isl * cs - $3
|
698
|
c += isl * cs;
|
699
|
}
|
700
|
|
701
|
# Config partition starts at cylinder boundary.
|
702
|
print "p 3 165 " c, csl * cs
|
703
|
c += csl * cs
|
704
|
|
705
|
# Data partition (if any) starts at cylinder boundary.
|
706
|
if ($7 > 0) {
|
707
|
print "p 4 165 " c, dsl * cs
|
708
|
} else if ($7 < 0 && $1 > c) {
|
709
|
print "p 4 165 " c, $1 - c
|
710
|
} else if ($1 < c) {
|
711
|
print "Disk space overcommitted by", \
|
712
|
c - $1, "sectors" > "/dev/stderr"
|
713
|
exit 2
|
714
|
}
|
715
|
|
716
|
# Force slice 1 to be marked active. This is necessary
|
717
|
# for booting the image from a USB device to work.
|
718
|
print "a 1"
|
719
|
}
|
720
|
' > ${IMAGES_FINAL_DIR}/_.fdisk
|
721
|
|
722
|
MNT=${IMAGES_FINAL_DIR}/_.mnt
|
723
|
mkdir -p ${MNT}
|
724
|
|
725
|
dd if=/dev/zero of=${IMG} bs=${NANO_SECTS}b \
|
726
|
count=0 seek=$((${NANO_MEDIASIZE}/${NANO_SECTS})) 2>&1 >> ${LOGFILE}
|
727
|
|
728
|
MD=$(mdconfig -a -t vnode -f ${IMG} -x ${NANO_SECTS} -y ${NANO_HEADS})
|
729
|
trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
730
|
|
731
|
fdisk -i -f ${IMAGES_FINAL_DIR}/_.fdisk ${MD} 2>&1 >> ${LOGFILE}
|
732
|
fdisk ${MD} 2>&1 >> ${LOGFILE}
|
733
|
|
734
|
boot0cfg -t 100 -B -b ${FINAL_CHROOT_DIR}/${NANO_BOOTLOADER} ${NANO_BOOT0CFG} ${MD} 2>&1 >> ${LOGFILE}
|
735
|
|
736
|
# Create first image
|
737
|
bsdlabel -m i386 -w -B -b ${FINAL_CHROOT_DIR}/boot/boot ${MD}s1 2>&1 >> ${LOGFILE}
|
738
|
bsdlabel -m i386 ${MD}s1 2>&1 >> ${LOGFILE}
|
739
|
local _label=$(lc ${PRODUCT_NAME})
|
740
|
newfs -L ${_label}0 ${NANO_NEWFS} /dev/${MD}s1a 2>&1 >> ${LOGFILE}
|
741
|
mount /dev/ufs/${_label}0 ${MNT}
|
742
|
if [ $? -ne 0 ]; then
|
743
|
echo ">>> ERROR: Something wrong happened during mount of first slice image creation. STOPPING!" | tee -a ${LOGFILE}
|
744
|
print_error_pfS
|
745
|
fi
|
746
|
# Consider the unmounting as well
|
747
|
trap "umount /dev/ufs/${_label}0; mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
748
|
|
749
|
clone_directory_contents ${FINAL_CHROOT_DIR} ${MNT}
|
750
|
|
751
|
# Set NanoBSD image size
|
752
|
echo "${_NANO_MEDIASIZE}" > ${MNT}/etc/nanosize.txt
|
753
|
|
754
|
echo "/dev/ufs/${_label}0 / ufs ro,sync,noatime 1 1" > ${MNT}/etc/fstab
|
755
|
if [ $NANO_CONFSIZE -gt 0 ] ; then
|
756
|
echo "/dev/ufs/cf /cf ufs ro,sync,noatime 1 1" >> ${MNT}/etc/fstab
|
757
|
fi
|
758
|
|
759
|
umount ${MNT}
|
760
|
# Restore the original trap
|
761
|
trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
762
|
|
763
|
# Setting NANO_IMAGES to 1 and NANO_INIT_IMG2 will tell
|
764
|
# NanoBSD to only create one partition. We default to 2
|
765
|
# partitions in case anything happens to the first the
|
766
|
# operator can boot from the 2nd and should be OK.
|
767
|
|
768
|
# Before just going to use dd for duplicate think!
|
769
|
# The images are created as sparse so lets take advantage
|
770
|
# of that by just exec some commands.
|
771
|
if [ $NANO_IMAGES -gt 1 -a $NANO_INIT_IMG2 -gt 0 ] ; then
|
772
|
# Duplicate to second image (if present)
|
773
|
echo ">>> Creating NanoBSD second slice by duplicating first slice." | tee -a ${LOGFILE}
|
774
|
# Create second image
|
775
|
dd if=/dev/${MD}s1 of=/dev/${MD}s2 conv=sparse bs=64k 2>&1 >> ${LOGFILE}
|
776
|
tunefs -L ${_label}1 /dev/${MD}s2a 2>&1 >> ${LOGFILE}
|
777
|
mount /dev/ufs/${_label}1 ${MNT}
|
778
|
if [ $? -ne 0 ]; then
|
779
|
echo ">>> ERROR: Something wrong happened during mount of second slice image creation. STOPPING!" | tee -a ${LOGFILE}
|
780
|
print_error_pfS
|
781
|
fi
|
782
|
# Consider the unmounting as well
|
783
|
trap "umount /dev/ufs/${_label}1; mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
784
|
|
785
|
echo "/dev/ufs/${_label}1 / ufs ro,sync,noatime 1 1" > ${MNT}/etc/fstab
|
786
|
if [ $NANO_CONFSIZE -gt 0 ] ; then
|
787
|
echo "/dev/ufs/cf /cf ufs ro,sync,noatime 1 1" >> ${MNT}/etc/fstab
|
788
|
fi
|
789
|
|
790
|
umount ${MNT}
|
791
|
# Restore the trap back
|
792
|
trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
793
|
fi
|
794
|
|
795
|
# Create Data slice, if any.
|
796
|
# Note the changing of the variable to NANO_CONFSIZE
|
797
|
# from NANO_DATASIZE. We also added glabel support
|
798
|
# and populate the Product configuration from the /cf
|
799
|
# directory located in FINAL_CHROOT_DIR
|
800
|
if [ $NANO_CONFSIZE -gt 0 ] ; then
|
801
|
echo ">>> Creating /cf area to hold config.xml"
|
802
|
newfs -L cf ${NANO_NEWFS} /dev/${MD}s3 2>&1 >> ${LOGFILE}
|
803
|
# Mount data partition and copy contents of /cf
|
804
|
# Can be used later to create custom default config.xml while building
|
805
|
mount /dev/ufs/cf ${MNT}
|
806
|
if [ $? -ne 0 ]; then
|
807
|
echo ">>> ERROR: Something wrong happened during mount of cf slice image creation. STOPPING!" | tee -a ${LOGFILE}
|
808
|
print_error_pfS
|
809
|
fi
|
810
|
# Consider the unmounting as well
|
811
|
trap "umount /dev/ufs/cf; mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
812
|
|
813
|
clone_directory_contents ${FINAL_CHROOT_DIR}/cf ${MNT}
|
814
|
|
815
|
umount ${MNT}
|
816
|
# Restore the trap back
|
817
|
trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
|
818
|
else
|
819
|
">>> [nanoo] NANO_CONFSIZE is not set. Not adding a /conf partition.. You sure about this??" | tee -a ${LOGFILE}
|
820
|
fi
|
821
|
|
822
|
echo ">>> [nanoo] Creating NanoBSD upgrade file from first slice..." | tee -a ${LOGFILE}
|
823
|
dd if=/dev/${MD}s1 of=$IMGUPDATE conv=sparse bs=64k 2>&1 >> ${LOGFILE}
|
824
|
|
825
|
mdconfig -d -u $MD
|
826
|
# Restore default action
|
827
|
trap "-" 1 2 15 EXIT
|
828
|
|
829
|
# Check each image and ensure that they are over
|
830
|
# 3 megabytes. If either image is under 20 megabytes
|
831
|
# in size then error out.
|
832
|
IMGSIZE=$(stat -f "%z" ${IMG})
|
833
|
IMGUPDATESIZE=$(stat -f "%z" ${IMGUPDATE})
|
834
|
CHECKSIZE="20040710"
|
835
|
if [ "$IMGSIZE" -lt "$CHECKSIZE" ]; then
|
836
|
echo ">>> ERROR: Something went wrong when building NanoBSD. The image size is under 20 megabytes!" | tee -a ${LOGFILE}
|
837
|
print_error_pfS
|
838
|
fi
|
839
|
if [ "$IMGUPDATESIZE" -lt "$CHECKSIZE" ]; then
|
840
|
echo ">>> ERROR: Something went wrong when building NanoBSD upgrade image. The image size is under 20 megabytes!" | tee -a ${LOGFILE}
|
841
|
print_error_pfS
|
842
|
fi
|
843
|
|
844
|
# Wrap up the show, Johnny
|
845
|
echo ">>> NanoBSD Image completed for size: $_NANO_MEDIASIZE." | tee -a ${LOGFILE}
|
846
|
|
847
|
gzip -qf $IMG &
|
848
|
_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
|
849
|
gzip -qf $IMGUPDATE &
|
850
|
_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
|
851
|
done
|
852
|
|
853
|
unset IMG
|
854
|
unset IMGUPDATE
|
855
|
unset IMGUPDATESIZE
|
856
|
unset IMGSIZE
|
857
|
|
858
|
ls -lah $IMAGES_FINAL_DIR
|
859
|
}
|
860
|
|
861
|
# This routine creates a ova image that contains
|
862
|
# a ovf and vmdk file. These files can be imported
|
863
|
# right into vmware or virtual box.
|
864
|
# (and many other emulation platforms)
|
865
|
# http://www.vmware.com/pdf/ovf_whitepaper_specification.pdf
|
866
|
create_ova_image() {
|
867
|
# XXX create a .ovf php creator that you can pass:
|
868
|
# 1. populatedSize
|
869
|
# 2. license
|
870
|
# 3. product name
|
871
|
# 4. version
|
872
|
# 5. number of network interface cards
|
873
|
# 6. allocationUnits
|
874
|
# 7. capacity
|
875
|
# 8. capacityAllocationUnits
|
876
|
|
877
|
LOGFILE=${BUILDER_LOGS}/ova.${TARGET}.log
|
878
|
|
879
|
[ -d "${OVA_TMP}" ] \
|
880
|
&& rm -rf ${OVA_TMP}
|
881
|
|
882
|
mkdir -p ${OVA_TMP}
|
883
|
|
884
|
if [ -z "${OVA_SWAP_PART_SIZE_IN_GB}" -o "${OVA_SWAP_PART_SIZE_IN_GB}" = "0" ]; then
|
885
|
# first partition size (freebsd-ufs)
|
886
|
local OVA_FIRST_PART_SIZE_IN_GB=${VMDK_DISK_CAPACITY_IN_GB}
|
887
|
# Calculate real first partition size, removing 128 blocks (65536 bytes) beginning/loader
|
888
|
local OVA_FIRST_PART_SIZE=$((${OVA_FIRST_PART_SIZE_IN_GB}*1024*1024*1024-65536))
|
889
|
# Unset swap partition size variable
|
890
|
unset OVA_SWAP_PART_SIZE
|
891
|
# Parameter used by mkimg
|
892
|
unset OVA_SWAP_PART_PARAM
|
893
|
else
|
894
|
# first partition size (freebsd-ufs)
|
895
|
local OVA_FIRST_PART_SIZE_IN_GB=$((VMDK_DISK_CAPACITY_IN_GB-OVA_SWAP_PART_SIZE_IN_GB))
|
896
|
# Use first partition size in g
|
897
|
local OVA_FIRST_PART_SIZE="${OVA_FIRST_PART_SIZE_IN_GB}g"
|
898
|
# Calculate real swap size, removing 128 blocks (65536 bytes) beginning/loader
|
899
|
local OVA_SWAP_PART_SIZE=$((${OVA_SWAP_PART_SIZE_IN_GB}*1024*1024*1024-65536))
|
900
|
# Parameter used by mkimg
|
901
|
local OVA_SWAP_PART_PARAM="-p freebsd-swap/swap0::${OVA_SWAP_PART_SIZE}"
|
902
|
fi
|
903
|
|
904
|
# Prepare folder to be put in image
|
905
|
customize_stagearea_for_image "ova"
|
906
|
install_default_kernel ${DEFAULT_KERNEL} "no"
|
907
|
|
908
|
# Fill fstab
|
909
|
echo ">>> Installing platform specific items..." | tee -a ${LOGFILE}
|
910
|
echo "/dev/gpt/${PRODUCT_NAME} / ufs rw 1 1" > ${FINAL_CHROOT_DIR}/etc/fstab
|
911
|
if [ -n "${OVA_SWAP_PART_SIZE}" ]; then
|
912
|
echo "/dev/gpt/swap0 none swap sw 0 0" >> ${FINAL_CHROOT_DIR}/etc/fstab
|
913
|
fi
|
914
|
|
915
|
# Create / partition
|
916
|
echo -n ">>> Creating / partition... " | tee -a ${LOGFILE}
|
917
|
makefs \
|
918
|
-B little \
|
919
|
-o label=${PRODUCT_NAME},version=2,bsize=32768,fsize=4096,maxbpg=4096,density=8192,minfree=8 \
|
920
|
-s ${OVA_FIRST_PART_SIZE} \
|
921
|
${OVA_TMP}/${OVFUFS} \
|
922
|
${FINAL_CHROOT_DIR} 2>&1 >> ${LOGFILE}
|
923
|
|
924
|
if [ $? -ne 0 -o ! -f ${OVA_TMP}/${OVFUFS} ]; then
|
925
|
if [ -f ${OVA_TMP}/${OVFUFS} ]; then
|
926
|
rm -f ${OVA_TMP}/${OVFUFS}
|
927
|
fi
|
928
|
echo "Failed!" | tee -a ${LOGFILE}
|
929
|
echo ">>> ERROR: Error creating vmdk / partition. STOPPING!" | tee -a ${LOGFILE}
|
930
|
print_error_pfS
|
931
|
fi
|
932
|
echo "Done!" | tee -a ${LOGFILE}
|
933
|
|
934
|
echo -n ">>> Enabling SUJ on recently created disk... " | tee -a ${LOGFILE}
|
935
|
if ! tunefs -j enable ${OVA_TMP}/${OVFUFS} 2>&1 >>${LOGFILE}; then
|
936
|
echo "Failed!" | tee -a ${LOGFILE}
|
937
|
echo ">>> ERROR: Error enabling SUJ on disk. STOPPING!" | tee -a ${LOGFILE}
|
938
|
print_error_pfS
|
939
|
fi
|
940
|
echo "Done!" | tee -a ${LOGFILE}
|
941
|
|
942
|
# Create raw disk
|
943
|
echo -n ">>> Creating raw disk... " | tee -a ${LOGFILE}
|
944
|
mkimg \
|
945
|
-s gpt \
|
946
|
-f raw \
|
947
|
-b ${FINAL_CHROOT_DIR}/boot/pmbr \
|
948
|
-p freebsd-boot:=${FINAL_CHROOT_DIR}/boot/gptboot \
|
949
|
-p freebsd-ufs/${PRODUCT_NAME}:=${OVA_TMP}/${OVFUFS} \
|
950
|
${OVA_SWAP_PART_PARAM} \
|
951
|
-o ${OVA_TMP}/${OVFRAW} 2>&1 >> ${LOGFILE}
|
952
|
|
953
|
if [ $? -ne 0 -o ! -f ${OVA_TMP}/${OVFRAW} ]; then
|
954
|
if [ -f ${OVA_TMP}/${OVFUFS} ]; then
|
955
|
rm -f ${OVA_TMP}/${OVFUFS}
|
956
|
fi
|
957
|
if [ -f ${OVA_TMP}/${OVFRAW} ]; then
|
958
|
rm -f ${OVA_TMP}/${OVFRAW}
|
959
|
fi
|
960
|
echo "Failed!" | tee -a ${LOGFILE}
|
961
|
echo ">>> ERROR: Error creating temporary vmdk image. STOPPING!" | tee -a ${LOGFILE}
|
962
|
print_error_pfS
|
963
|
fi
|
964
|
echo "Done!" | tee -a ${LOGFILE}
|
965
|
|
966
|
# We don't need it anymore
|
967
|
rm -f ${OVA_TMP}/${OVFUFS} >/dev/null 2>&1
|
968
|
|
969
|
# Convert raw to vmdk
|
970
|
echo -n ">>> Creating vmdk disk... " | tee -a ${LOGFILE}
|
971
|
vmdktool -z9 -v ${OVA_TMP}/${OVFVMDK} ${OVA_TMP}/${OVFRAW}
|
972
|
|
973
|
if [ $? -ne 0 -o ! -f ${OVA_TMP}/${OVFVMDK} ]; then
|
974
|
if [ -f ${OVA_TMP}/${OVFRAW} ]; then
|
975
|
rm -f ${OVA_TMP}/${OVFRAW}
|
976
|
fi
|
977
|
if [ -f ${OVA_TMP}/${OVFVMDK} ]; then
|
978
|
rm -f ${OVA_TMP}/${OVFVMDK}
|
979
|
fi
|
980
|
echo "Failed!" | tee -a ${LOGFILE}
|
981
|
echo ">>> ERROR: Error creating vmdk image. STOPPING!" | tee -a ${LOGFILE}
|
982
|
print_error_pfS
|
983
|
fi
|
984
|
echo "Done!" | tee -a ${LOGFILE}
|
985
|
|
986
|
rm -f ${OVA_TMP}/i${OVFRAW}
|
987
|
|
988
|
ova_setup_ovf_template
|
989
|
|
990
|
echo -n ">>> Writing final ova image... " | tee -a ${LOGFILE}
|
991
|
# Create OVA file for vmware
|
992
|
gtar -C ${OVA_TMP} -cpf ${OVAPATH} ${PRODUCT_NAME}.ovf ${OVFVMDK}
|
993
|
echo "Done!" | tee -a ${LOGFILE}
|
994
|
rm -f ${OVA_TMP}/${OVFVMDK} >/dev/null 2>&1
|
995
|
|
996
|
echo ">>> OVA created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
|
997
|
}
|
998
|
|
999
|
# called from create_ova_image
|
1000
|
ova_setup_ovf_template() {
|
1001
|
if [ ! -f ${OVFTEMPLATE} ]; then
|
1002
|
echo ">>> ERROR: OVF template file (${OVFTEMPLATE}) not found."
|
1003
|
print_error_pfS
|
1004
|
fi
|
1005
|
|
1006
|
# OperatingSystemSection (${PRODUCT_NAME}.ovf)
|
1007
|
# 42 FreeBSD 32-Bit
|
1008
|
# 78 FreeBSD 64-Bit
|
1009
|
if [ "${TARGET}" = "amd64" ]; then
|
1010
|
local _os_id="78"
|
1011
|
local _os_type="freebsd64Guest"
|
1012
|
local _os_descr="FreeBSD 64-Bit"
|
1013
|
elif [ "${TARGET}" = "i386" ]; then
|
1014
|
local _os_id="42"
|
1015
|
local _os_type="freebsdGuest"
|
1016
|
local _os_descr="FreeBSD"
|
1017
|
else
|
1018
|
echo ">>> ERROR: Platform not supported for OVA (${TARGET})"
|
1019
|
print_error_pfS
|
1020
|
fi
|
1021
|
|
1022
|
local POPULATED_SIZE=$(du -d0 -k $FINAL_CHROOT_DIR | cut -f1)
|
1023
|
local POPULATED_SIZE_IN_BYTES=$((${POPULATED_SIZE}*1024))
|
1024
|
local VMDK_FILE_SIZE=$(stat -f "%z" ${OVA_TMP}/${OVFVMDK})
|
1025
|
|
1026
|
sed \
|
1027
|
-e "s,%%VMDK_FILE_SIZE%%,${VMDK_FILE_SIZE},g" \
|
1028
|
-e "s,%%VMDK_DISK_CAPACITY_IN_GB%%,${VMDK_DISK_CAPACITY_IN_GB},g" \
|
1029
|
-e "s,%%POPULATED_SIZE_IN_BYTES%%,${POPULATED_SIZE_IN_BYTES},g" \
|
1030
|
-e "s,%%OS_ID%%,${_os_id},g" \
|
1031
|
-e "s,%%OS_TYPE%%,${_os_type},g" \
|
1032
|
-e "s,%%OS_DESCR%%,${_os_descr},g" \
|
1033
|
-e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" \
|
1034
|
-e "s,%%PRODUCT_NAME_SUFFIX%%,${PRODUCT_NAME_SUFFIX},g" \
|
1035
|
-e "s,%%PRODUCT_VERSION%%,${PRODUCT_VERSION},g" \
|
1036
|
-e "s,%%PRODUCT_URL%%,${PRODUCT_URL},g" \
|
1037
|
-e "s#%%VENDOR_NAME%%#${VENDOR_NAME}#g" \
|
1038
|
-e "s#%%OVF_INFO%%#${OVF_INFO}#g" \
|
1039
|
-e "/^%%PRODUCT_LICENSE%%/r ${BUILDER_ROOT}/license.txt" \
|
1040
|
-e "/^%%PRODUCT_LICENSE%%/d" \
|
1041
|
${OVFTEMPLATE} > ${OVA_TMP}/${PRODUCT_NAME}.ovf
|
1042
|
}
|
1043
|
|
1044
|
# Cleans up previous builds
|
1045
|
clean_builder() {
|
1046
|
# Clean out directories
|
1047
|
echo ">>> Cleaning up previous build environment...Please wait!"
|
1048
|
|
1049
|
staginareas_clean_each_run
|
1050
|
|
1051
|
if [ -d "${STAGE_CHROOT_DIR}" ]; then
|
1052
|
BASENAME=$(basename ${STAGE_CHROOT_DIR})
|
1053
|
echo -n ">>> Cleaning ${STAGE_CHROOT_DIR} ..."
|
1054
|
chflags -R noschg ${STAGE_CHROOT_DIR} 2>&1 >/dev/null
|
1055
|
rm -rf ${STAGE_CHROOT_DIR}/* 2>/dev/null
|
1056
|
echo "Done."
|
1057
|
fi
|
1058
|
|
1059
|
if [ -z "${NO_CLEAN_FREEBSD_OBJ}" -a -d "${FREEBSD_SRC_DIR}" ]; then
|
1060
|
OBJTREE=$(env TARGET=${TARGET} TARGET_ARCH=${TARGET_ARCH} make -C ${FREEBSD_SRC_DIR} -V OBJTREE)
|
1061
|
if [ -d "${OBJTREE}" ]; then
|
1062
|
echo -n ">>> Cleaning FreeBSD objects dir staging..."
|
1063
|
echo -n "."
|
1064
|
chflags -R noschg ${OBJTREE} 2>&1 >/dev/null
|
1065
|
echo -n "."
|
1066
|
rm -rf ${OBJTREE}/*
|
1067
|
echo "Done!"
|
1068
|
fi
|
1069
|
if [ -d "${KERNEL_BUILD_PATH}" ]; then
|
1070
|
echo -n ">>> Cleaning previously built kernel stage area..."
|
1071
|
rm -rf $KERNEL_BUILD_PATH/*
|
1072
|
echo "Done!"
|
1073
|
fi
|
1074
|
fi
|
1075
|
mkdir -p $KERNEL_BUILD_PATH
|
1076
|
|
1077
|
echo -n ">>> Cleaning previously built images..."
|
1078
|
rm -rf $IMAGES_FINAL_DIR/*
|
1079
|
rm -rf $STAGINGAREA/*
|
1080
|
echo "Done!"
|
1081
|
|
1082
|
if [ -z "${NO_CLEAN_FREEBSD_SRC}" ]; then
|
1083
|
if [ -d "$FREEBSD_SRC_DIR" ]; then
|
1084
|
echo -n ">>> Ensuring $FREEBSD_SRC_DIR is clean..."
|
1085
|
rm -rf ${FREEBSD_SRC_DIR}
|
1086
|
echo "Done!"
|
1087
|
fi
|
1088
|
fi
|
1089
|
|
1090
|
echo -n ">>> Cleaning previous builder logs..."
|
1091
|
if [ -d "$BUILDER_LOGS" ]; then
|
1092
|
rm -rf ${BUILDER_LOGS}
|
1093
|
fi
|
1094
|
mkdir -p ${BUILDER_LOGS}
|
1095
|
|
1096
|
echo "Done!"
|
1097
|
|
1098
|
echo ">>> Cleaning of builder environment has finished."
|
1099
|
}
|
1100
|
|
1101
|
clone_directory_contents() {
|
1102
|
if [ ! -e "$2" ]; then
|
1103
|
mkdir -p "$2"
|
1104
|
fi
|
1105
|
if [ ! -d "$1" -o ! -d "$2" ]; then
|
1106
|
if [ -z "${LOGFILE}" ]; then
|
1107
|
echo ">>> ERROR: Argument $1 supplied is not a directory!"
|
1108
|
else
|
1109
|
echo ">>> ERROR: Argument $1 supplied is not a directory!" | tee -a ${LOGFILE}
|
1110
|
fi
|
1111
|
print_error_pfS
|
1112
|
fi
|
1113
|
echo -n ">>> Using TAR to clone $1 to $2 ..."
|
1114
|
tar -C ${1} -c -f - . | tar -C ${2} -x -p -f -
|
1115
|
echo "Done!"
|
1116
|
}
|
1117
|
|
1118
|
clone_to_staging_area() {
|
1119
|
# Clone everything to the final staging area
|
1120
|
echo -n ">>> Cloning everything to ${STAGE_CHROOT_DIR} staging area..."
|
1121
|
LOGFILE=${BUILDER_LOGS}/cloning.${TARGET}.log
|
1122
|
|
1123
|
tar -C ${PRODUCT_SRC} -c -f - . | \
|
1124
|
tar -C ${STAGE_CHROOT_DIR} -x -p -f -
|
1125
|
|
1126
|
if [ "${PRODUCT_NAME}" != "pfSense" ]; then
|
1127
|
mv ${STAGE_CHROOT_DIR}/usr/local/sbin/pfSense-upgrade \
|
1128
|
${STAGE_CHROOT_DIR}/usr/local/sbin/${PRODUCT_NAME}-upgrade
|
1129
|
fi
|
1130
|
|
1131
|
if [ -f ${STAGE_CHROOT_DIR}/etc/master.passwd ]; then
|
1132
|
chroot ${STAGE_CHROOT_DIR} pwd_mkdb /etc/master.passwd
|
1133
|
fi
|
1134
|
mkdir -p ${STAGE_CHROOT_DIR}/etc/mtree
|
1135
|
mtree -Pcp ${STAGE_CHROOT_DIR}/var > ${STAGE_CHROOT_DIR}/etc/mtree/var.dist
|
1136
|
mtree -Pcp ${STAGE_CHROOT_DIR}/etc > ${STAGE_CHROOT_DIR}/etc/mtree/etc.dist
|
1137
|
if [ -d ${STAGE_CHROOT_DIR}/usr/local/etc ]; then
|
1138
|
mtree -Pcp ${STAGE_CHROOT_DIR}/usr/local/etc > ${STAGE_CHROOT_DIR}/etc/mtree/localetc.dist
|
1139
|
fi
|
1140
|
|
1141
|
## Add buildtime and lastcommit information
|
1142
|
# This is used for detecting updates.
|
1143
|
echo "$BUILTDATESTRING" > $STAGE_CHROOT_DIR/etc/version.buildtime
|
1144
|
# Record last commit info if it is available.
|
1145
|
if [ -f $SCRATCHDIR/build_commit_info.txt ]; then
|
1146
|
cp $SCRATCHDIR/build_commit_info.txt $STAGE_CHROOT_DIR/etc/version.lastcommit
|
1147
|
fi
|
1148
|
|
1149
|
local _exclude_files="${CORE_PKG_TMP}/base_exclude_files"
|
1150
|
sed \
|
1151
|
-e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" \
|
1152
|
-e "s,%%VERSION%%,${_version},g" \
|
1153
|
${BUILDER_TOOLS}/templates/core_pkg/base/exclude_files \
|
1154
|
> ${_exclude_files}
|
1155
|
|
1156
|
mkdir -p ${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR} >/dev/null 2>&1
|
1157
|
|
1158
|
# Include a sample pkg stable conf to base
|
1159
|
setup_pkg_repo \
|
1160
|
${PKG_REPO_DEFAULT} \
|
1161
|
${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR}/${PRODUCT_NAME}-repo.conf \
|
1162
|
${TARGET} \
|
1163
|
${TARGET_ARCH}
|
1164
|
|
1165
|
mtree \
|
1166
|
-c \
|
1167
|
-k uid,gid,mode,size,flags,sha256digest \
|
1168
|
-p ${STAGE_CHROOT_DIR} \
|
1169
|
-X ${_exclude_files} \
|
1170
|
> ${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR}/base.mtree
|
1171
|
tar \
|
1172
|
-C ${STAGE_CHROOT_DIR} \
|
1173
|
-cJf ${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR}/base.txz \
|
1174
|
-X ${_exclude_files} \
|
1175
|
.
|
1176
|
|
1177
|
local _share_repos_path="${SCRATCHDIR}/repo-tmp/${PRODUCT_SHARE_DIR}/pkg/repos"
|
1178
|
rm -rf ${SCRATCHDIR}/repo-tmp >/dev/null 2>&1
|
1179
|
mkdir -p ${_share_repos_path} >/dev/null 2>&1
|
1180
|
|
1181
|
setup_pkg_repo \
|
1182
|
${PKG_REPO_DEFAULT} \
|
1183
|
${_share_repos_path}/${PRODUCT_NAME}-repo.conf \
|
1184
|
${TARGET} \
|
1185
|
${TARGET_ARCH}
|
1186
|
|
1187
|
cp -f ${PKG_REPO_DEFAULT%%.conf}.descr ${_share_repos_path}
|
1188
|
|
1189
|
# Add additional repos
|
1190
|
for _template in ${PKG_REPO_BASE}/${PRODUCT_NAME}-repo-*.conf; do
|
1191
|
_template_filename=$(basename ${_template})
|
1192
|
setup_pkg_repo \
|
1193
|
${_template} \
|
1194
|
${_share_repos_path}/${_template_filename} \
|
1195
|
${TARGET} \
|
1196
|
${TARGET_ARCH}
|
1197
|
cp -f ${_template%%.conf}.descr ${_share_repos_path}
|
1198
|
done
|
1199
|
|
1200
|
core_pkg_create repo "" ${CORE_PKG_VERSION} ${SCRATCHDIR}/repo-tmp
|
1201
|
|
1202
|
core_pkg_create rc "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
|
1203
|
core_pkg_create base "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
|
1204
|
core_pkg_create base-nanobsd "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
|
1205
|
core_pkg_create default-config "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
|
1206
|
|
1207
|
local DEFAULTCONF=${STAGE_CHROOT_DIR}/conf.default/config.xml
|
1208
|
|
1209
|
# Save current WAN and LAN if value
|
1210
|
local _old_wan_if=$(xml sel -t -v "${XML_ROOTOBJ}/interfaces/wan/if" ${DEFAULTCONF})
|
1211
|
local _old_lan_if=$(xml sel -t -v "${XML_ROOTOBJ}/interfaces/lan/if" ${DEFAULTCONF})
|
1212
|
|
1213
|
# Change default interface names to match vmware driver
|
1214
|
xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/wan/if" -v "vmx0" ${DEFAULTCONF}
|
1215
|
xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/lan/if" -v "vmx1" ${DEFAULTCONF}
|
1216
|
core_pkg_create default-config "vmware" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
|
1217
|
|
1218
|
# Restore default values to be used by serial package
|
1219
|
xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/wan/if" -v "${_old_wan_if}" ${DEFAULTCONF}
|
1220
|
xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/lan/if" -v "${_old_lan_if}" ${DEFAULTCONF}
|
1221
|
|
1222
|
# Activate serial console in config.xml
|
1223
|
xml ed -L -P -d "${XML_ROOTOBJ}/system/enableserial" ${DEFAULTCONF}
|
1224
|
xml ed -P -s "${XML_ROOTOBJ}/system" -t elem -n "enableserial" \
|
1225
|
${DEFAULTCONF} > ${DEFAULTCONF}.tmp
|
1226
|
xml fo -t ${DEFAULTCONF}.tmp > ${DEFAULTCONF}
|
1227
|
rm -f ${DEFAULTCONF}.tmp
|
1228
|
|
1229
|
echo force > ${STAGE_CHROOT_DIR}/cf/conf/enableserial_force
|
1230
|
|
1231
|
core_pkg_create default-config-serial "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
|
1232
|
|
1233
|
rm -f ${STAGE_CHROOT_DIR}/cf/conf/enableserial_force
|
1234
|
rm -f ${STAGE_CHROOT_DIR}/cf/conf/config.xml
|
1235
|
|
1236
|
# Make sure pkg is present
|
1237
|
pkg_bootstrap ${STAGE_CHROOT_DIR}
|
1238
|
|
1239
|
echo "Done!"
|
1240
|
}
|
1241
|
|
1242
|
create_final_staging_area() {
|
1243
|
if [ -z "${FINAL_CHROOT_DIR}" ]; then
|
1244
|
echo ">>> ERROR: FINAL_CHROOT_DIR is not set, cannot continue!" | tee -a ${LOGFILE}
|
1245
|
print_error_pfS
|
1246
|
fi
|
1247
|
|
1248
|
if [ -d "${FINAL_CHROOT_DIR}" ]; then
|
1249
|
echo -n ">>> Previous ${FINAL_CHROOT_DIR} detected cleaning up..." | tee -a ${LOGFILE}
|
1250
|
chflags -R noschg ${FINAL_CHROOT_DIR} 2>&1 1>/dev/null
|
1251
|
rm -rf ${FINAL_CHROOT_DIR}/* 2>&1 1>/dev/null
|
1252
|
echo "Done." | tee -a ${LOGFILE}
|
1253
|
fi
|
1254
|
|
1255
|
echo ">>> Preparing Final image staging area: $(LC_ALL=C date)" 2>&1 | tee -a ${LOGFILE}
|
1256
|
echo ">>> Cloning ${STAGE_CHROOT_DIR} to ${FINAL_CHROOT_DIR}" 2>&1 | tee -a ${LOGFILE}
|
1257
|
clone_directory_contents ${STAGE_CHROOT_DIR} ${FINAL_CHROOT_DIR}
|
1258
|
|
1259
|
if [ ! -f $FINAL_CHROOT_DIR/sbin/init ]; then
|
1260
|
echo ">>> ERROR: Something went wrong during cloning -- Please verify!" 2>&1 | tee -a ${LOGFILE}
|
1261
|
print_error_pfS
|
1262
|
fi
|
1263
|
}
|
1264
|
|
1265
|
customize_stagearea_for_image() {
|
1266
|
local _image_type="$1"
|
1267
|
local _default_config=""
|
1268
|
|
1269
|
if [ -n "$2" ]; then
|
1270
|
_default_config="$2"
|
1271
|
elif [ "${_image_type}" = "nanobsd" -o \
|
1272
|
"${_image_type}" = "memstickserial" -o \
|
1273
|
"${_image_type}" = "memstickadi" ]; then
|
1274
|
_default_config="default-config-serial"
|
1275
|
elif [ "${_image_type}" = "ova" ]; then
|
1276
|
_default_config="default-config-vmware"
|
1277
|
else
|
1278
|
_default_config="default-config"
|
1279
|
fi
|
1280
|
|
1281
|
# Prepare final stage area
|
1282
|
create_final_staging_area
|
1283
|
|
1284
|
pkg_chroot_add ${FINAL_CHROOT_DIR} rc
|
1285
|
pkg_chroot_add ${FINAL_CHROOT_DIR} repo
|
1286
|
|
1287
|
if [ "${_image_type}" = "nanobsd" -o \
|
1288
|
"${_image_type}" = "nanobsd-vga" ]; then
|
1289
|
|
1290
|
mkdir -p ${FINAL_CHROOT_DIR}/root/var/db \
|
1291
|
${FINAL_CHROOT_DIR}/root/var/cache \
|
1292
|
${FINAL_CHROOT_DIR}/var/db/pkg \
|
1293
|
${FINAL_CHROOT_DIR}/var/cache/pkg
|
1294
|
mv -f ${FINAL_CHROOT_DIR}/var/db/pkg ${FINAL_CHROOT_DIR}/root/var/db
|
1295
|
mv -f ${FINAL_CHROOT_DIR}/var/cache/pkg ${FINAL_CHROOT_DIR}/root/var/cache
|
1296
|
ln -sf ../../root/var/db/pkg ${FINAL_CHROOT_DIR}/var/db/pkg
|
1297
|
ln -sf ../../root/var/cache/pkg ${FINAL_CHROOT_DIR}/var/cache/pkg
|
1298
|
|
1299
|
pkg_chroot_add ${FINAL_CHROOT_DIR} base-nanobsd
|
1300
|
else
|
1301
|
pkg_chroot_add ${FINAL_CHROOT_DIR} base
|
1302
|
fi
|
1303
|
|
1304
|
if [ "${_image_type}" = "iso" -o \
|
1305
|
"${_image_type}" = "memstick" -o \
|
1306
|
"${_image_type}" = "memstickserial" -o \
|
1307
|
"${_image_type}" = "memstickadi" ]; then
|
1308
|
install_bsdinstaller
|
1309
|
mkdir -p ${FINAL_CHROOT_DIR}/pkgs
|
1310
|
cp ${CORE_PKG_REAL_PATH}/All/*default-config*.txz ${FINAL_CHROOT_DIR}/pkgs
|
1311
|
fi
|
1312
|
|
1313
|
pkg_chroot_add ${FINAL_CHROOT_DIR} ${_default_config}
|
1314
|
|
1315
|
# XXX: Workaround to avoid pkg to complain regarding release
|
1316
|
# repo on first boot since packages are installed from
|
1317
|
# staging server during build phase
|
1318
|
if [ -n "${USE_PKG_REPO_STAGING}" ]; then
|
1319
|
_read_cmd="select value from repodata where key='packagesite'"
|
1320
|
if [ -n "${_IS_RELEASE}" ]; then
|
1321
|
local _tgt_server="${PKG_REPO_SERVER_RELEASE}"
|
1322
|
else
|
1323
|
local _tgt_server="${PKG_REPO_SERVER_DEVEL}"
|
1324
|
fi
|
1325
|
for _db in ${FINAL_CHROOT_DIR}/var/db/pkg/repo-*sqlite; do
|
1326
|
_cur=$(/usr/local/bin/sqlite3 ${_db} "${_read_cmd}")
|
1327
|
_new=$(echo "${_cur}" | sed -e "s,^${PKG_REPO_SERVER_STAGING},${_tgt_server},")
|
1328
|
/usr/local/bin/sqlite3 ${_db} "update repodata set value='${_new}' where key='packagesite'"
|
1329
|
done
|
1330
|
fi
|
1331
|
}
|
1332
|
|
1333
|
create_distribution_tarball() {
|
1334
|
mkdir -p ${FINAL_CHROOT_DIR}/install
|
1335
|
|
1336
|
tar -C ${FINAL_CHROOT_DIR} --exclude ./install --exclude ./pkgs -cJf ${FINAL_CHROOT_DIR}/install/${PRODUCT_NAME}.txz .
|
1337
|
}
|
1338
|
|
1339
|
create_iso_image() {
|
1340
|
LOGFILE=${BUILDER_LOGS}/isoimage.${TARGET}
|
1341
|
echo ">>> Building bootable ISO image for ${TARGET}" | tee -a ${LOGFILE}
|
1342
|
if [ -z "${DEFAULT_KERNEL}" ]; then
|
1343
|
echo ">>> ERROR: Could not identify DEFAULT_KERNEL to install on image!" | tee -a ${LOGFILE}
|
1344
|
print_error_pfS
|
1345
|
fi
|
1346
|
|
1347
|
customize_stagearea_for_image "iso"
|
1348
|
install_default_kernel ${DEFAULT_KERNEL}
|
1349
|
|
1350
|
echo cdrom > $FINAL_CHROOT_DIR/etc/platform
|
1351
|
|
1352
|
FSLABEL=$(echo ${PRODUCT_NAME} | tr '[:lower:]' '[:upper:]')
|
1353
|
echo "/dev/iso9660/${FSLABEL} / cd9660 ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
|
1354
|
|
1355
|
# This check is for supporting create memstick/ova images
|
1356
|
echo -n ">>> Running command: script -aq $LOGFILE makefs -t cd9660 -o bootimage=\"i386;${FINAL_CHROOT_DIR}/boot/cdboot \"-o no-emul-boot -o rockridge " | tee -a ${LOGFILE}
|
1357
|
echo "-o label=${FSLABEL} -o publisher=\"${PRODUCT_NAME} project.\" $ISOPATH ${FINAL_CHROOT_DIR}" | tee -a ${LOGFILE}
|
1358
|
|
1359
|
create_distribution_tarball
|
1360
|
|
1361
|
# Remove /rescue from iso since cd9660 cannot deal with hardlinks
|
1362
|
rm -rf ${FINAL_CHROOT_DIR}/rescue
|
1363
|
|
1364
|
makefs -t cd9660 -o bootimage="i386;${FINAL_CHROOT_DIR}/boot/cdboot" -o no-emul-boot -o rockridge \
|
1365
|
-o label=${FSLABEL} -o publisher="${PRODUCT_NAME} project." $ISOPATH ${FINAL_CHROOT_DIR} 2>&1 >> ${LOGFILE}
|
1366
|
if [ $? -ne 0 -o ! -f $ISOPATH ]; then
|
1367
|
if [ -f ${ISOPATH} ]; then
|
1368
|
rm -f $ISOPATH
|
1369
|
fi
|
1370
|
echo ">>> ERROR: Something wrong happened during ISO image creation. STOPPING!" | tee -a ${LOGFILE}
|
1371
|
print_error_pfS
|
1372
|
fi
|
1373
|
gzip -qf $ISOPATH &
|
1374
|
_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
|
1375
|
|
1376
|
echo ">>> ISO created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
|
1377
|
}
|
1378
|
|
1379
|
create_memstick_image() {
|
1380
|
|
1381
|
LOGFILE=${BUILDER_LOGS}/memstick.${TARGET}
|
1382
|
if [ "${MEMSTICKPATH}" = "" ]; then
|
1383
|
echo ">>> MEMSTICKPATH is empty skipping generation of memstick image!" | tee -a ${LOGFILE}
|
1384
|
return
|
1385
|
fi
|
1386
|
|
1387
|
customize_stagearea_for_image "memstick"
|
1388
|
install_default_kernel ${DEFAULT_KERNEL}
|
1389
|
|
1390
|
echo cdrom > $FINAL_CHROOT_DIR/etc/platform
|
1391
|
|
1392
|
echo ">>> Creating memstick to ${MEMSTICKPATH}." 2>&1 | tee -a ${LOGFILE}
|
1393
|
echo "/dev/ufs/${PRODUCT_NAME} / ufs ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
|
1394
|
echo "kern.cam.boot_delay=10000" >> ${FINAL_CHROOT_DIR}/boot/loader.conf.local
|
1395
|
|
1396
|
create_distribution_tarball
|
1397
|
|
1398
|
makefs -B little -o label=${PRODUCT_NAME},version=2 ${MEMSTICKPATH} ${FINAL_CHROOT_DIR}
|
1399
|
if [ $? -ne 0 ]; then
|
1400
|
if [ -f ${MEMSTICKPATH} ]; then
|
1401
|
rm -f $MEMSTICKPATH
|
1402
|
fi
|
1403
|
echo ">>> ERROR: Something wrong happened during MEMSTICK image creation. STOPPING!" | tee -a ${LOGFILE}
|
1404
|
print_error_pfS
|
1405
|
fi
|
1406
|
MD=$(mdconfig -a -t vnode -f $MEMSTICKPATH)
|
1407
|
# Just in case
|
1408
|
trap "mdconfig -d -u ${MD}" 1 2 15 EXIT
|
1409
|
gpart create -s BSD ${MD} 2>&1 >> ${LOGFILE}
|
1410
|
gpart bootcode -b ${FINAL_CHROOT_DIR}/boot/boot ${MD} 2>&1 >> ${LOGFILE}
|
1411
|
gpart add -t freebsd-ufs ${MD} 2>&1 >> ${LOGFILE}
|
1412
|
trap "-" 1 2 15 EXIT
|
1413
|
mdconfig -d -u ${MD} 2>&1 | tee -a ${LOGFILE}
|
1414
|
gzip -qf $MEMSTICKPATH &
|
1415
|
_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
|
1416
|
|
1417
|
echo ">>> MEMSTICK created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
|
1418
|
}
|
1419
|
|
1420
|
create_memstick_serial_image() {
|
1421
|
LOGFILE=${BUILDER_LOGS}/memstickserial.${TARGET}
|
1422
|
if [ "${MEMSTICKSERIALPATH}" = "" ]; then
|
1423
|
echo ">>> MEMSTICKSERIALPATH is empty skipping generation of memstick image!" | tee -a ${LOGFILE}
|
1424
|
return
|
1425
|
fi
|
1426
|
|
1427
|
customize_stagearea_for_image "memstickserial"
|
1428
|
install_default_kernel ${DEFAULT_KERNEL}
|
1429
|
|
1430
|
echo cdrom > $FINAL_CHROOT_DIR/etc/platform
|
1431
|
|
1432
|
echo "/dev/ufs/${PRODUCT_NAME} / ufs ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
|
1433
|
echo "kern.cam.boot_delay=10000" >> ${FINAL_CHROOT_DIR}/boot/loader.conf.local
|
1434
|
|
1435
|
echo ">>> Creating serial memstick to ${MEMSTICKSERIALPATH}." 2>&1 | tee -a ${LOGFILE}
|
1436
|
|
1437
|
BOOTCONF=${FINAL_CHROOT_DIR}/boot.config
|
1438
|
LOADERCONF=${FINAL_CHROOT_DIR}/boot/loader.conf
|
1439
|
|
1440
|
echo ">>> Activating serial console..." 2>&1 | tee -a ${LOGFILE}
|
1441
|
# Activate serial console in boot.config
|
1442
|
if [ -f ${BOOTCONF} ]; then
|
1443
|
sed -i "" '/-D$/d' ${BOOTCONF}
|
1444
|
fi
|
1445
|
echo "-S115200 -D" >> ${BOOTCONF}
|
1446
|
|
1447
|
# Remove old console options if present.
|
1448
|
[ -f "${LOADERCONF}" ] \
|
1449
|
&& sed -i "" -Ee "/(console|boot_multicons|boot_serial)/d" ${LOADERCONF}
|
1450
|
# Activate serial console+video console in loader.conf
|
1451
|
echo 'boot_multicons="YES"' >> ${LOADERCONF}
|
1452
|
echo 'boot_serial="YES"' >> ${LOADERCONF}
|
1453
|
echo 'console="comconsole,vidconsole"' >> ${LOADERCONF}
|
1454
|
echo 'comconsole_speed="115200"' >> ${LOADERCONF}
|
1455
|
|
1456
|
create_distribution_tarball
|
1457
|
|
1458
|
makefs -B little -o label=${PRODUCT_NAME},version=2 ${MEMSTICKSERIALPATH} ${FINAL_CHROOT_DIR}
|
1459
|
if [ $? -ne 0 ]; then
|
1460
|
if [ -f ${MEMSTICKSERIALPATH} ]; then
|
1461
|
rm -f $MEMSTICKSERIALPATH
|
1462
|
fi
|
1463
|
echo ">>> ERROR: Something wrong happened during MEMSTICKSERIAL image creation. STOPPING!" | tee -a ${LOGFILE}
|
1464
|
print_error_pfS
|
1465
|
fi
|
1466
|
MD=$(mdconfig -a -t vnode -f $MEMSTICKSERIALPATH)
|
1467
|
# Just in case
|
1468
|
trap "mdconfig -d -u ${MD}" 1 2 15 EXIT
|
1469
|
gpart create -s BSD ${MD} 2>&1 >> ${LOGFILE}
|
1470
|
gpart bootcode -b ${FINAL_CHROOT_DIR}/boot/boot ${MD} 2>&1 >> ${LOGFILE}
|
1471
|
gpart add -t freebsd-ufs ${MD} 2>&1 >> ${LOGFILE}
|
1472
|
trap "-" 1 2 15 EXIT
|
1473
|
mdconfig -d -u ${MD} 2>&1 >> ${LOGFILE}
|
1474
|
gzip -qf $MEMSTICKSERIALPATH &
|
1475
|
_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
|
1476
|
|
1477
|
echo ">>> MEMSTICKSERIAL created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
|
1478
|
}
|
1479
|
|
1480
|
create_memstick_adi_image() {
|
1481
|
LOGFILE=${BUILDER_LOGS}/memstickadi.${TARGET}
|
1482
|
if [ "${MEMSTICKADIPATH}" = "" ]; then
|
1483
|
echo ">>> MEMSTICKADIPATH is empty skipping generation of memstick image!" | tee -a ${LOGFILE}
|
1484
|
return
|
1485
|
fi
|
1486
|
|
1487
|
customize_stagearea_for_image "memstickadi"
|
1488
|
install_default_kernel ${DEFAULT_KERNEL}
|
1489
|
|
1490
|
echo cdrom > $FINAL_CHROOT_DIR/etc/platform
|
1491
|
|
1492
|
echo "/dev/ufs/${PRODUCT_NAME} / ufs ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
|
1493
|
echo "kern.cam.boot_delay=10000" >> ${FINAL_CHROOT_DIR}/boot/loader.conf.local
|
1494
|
|
1495
|
echo ">>> Creating serial memstick to ${MEMSTICKADIPATH}." 2>&1 | tee -a ${LOGFILE}
|
1496
|
|
1497
|
BOOTCONF=${FINAL_CHROOT_DIR}/boot.config
|
1498
|
LOADERCONF=${FINAL_CHROOT_DIR}/boot/loader.conf
|
1499
|
|
1500
|
echo ">>> Activating serial console..." 2>&1 | tee -a ${LOGFILE}
|
1501
|
# Activate serial console in boot.config
|
1502
|
if [ -f ${BOOTCONF} ]; then
|
1503
|
sed -i "" '/-[Dh]$/d' ${BOOTCONF}
|
1504
|
fi
|
1505
|
echo "-S115200 -h" >> ${BOOTCONF}
|
1506
|
|
1507
|
# Remove old console options if present.
|
1508
|
[ -f "${LOADERCONF}" ] \
|
1509
|
&& sed -i "" -Ee "/(console|boot_multicons|boot_serial|hint.uart)/d" ${LOADERCONF}
|
1510
|
# Activate serial console+video console in loader.conf
|
1511
|
echo 'boot_serial="YES"' >> ${LOADERCONF}
|
1512
|
echo 'console="comconsole"' >> ${LOADERCONF}
|
1513
|
echo 'comconsole_speed="115200"' >> ${LOADERCONF}
|
1514
|
echo 'comconsole_port="0x2F8"' >> ${LOADERCONF}
|
1515
|
echo 'hint.uart.0.flags="0x00"' >> ${LOADERCONF}
|
1516
|
echo 'hint.uart.1.flags="0x10"' >> ${LOADERCONF}
|
1517
|
|
1518
|
create_distribution_tarball
|
1519
|
|
1520
|
makefs -B little -o label=${PRODUCT_NAME},version=2 ${MEMSTICKADIPATH} ${FINAL_CHROOT_DIR}
|
1521
|
if [ $? -ne 0 ]; then
|
1522
|
if [ -f ${MEMSTICKADIPATH} ]; then
|
1523
|
rm -f $MEMSTICKADIPATH
|
1524
|
fi
|
1525
|
echo ">>> ERROR: Something wrong happened during MEMSTICKADI image creation. STOPPING!" | tee -a ${LOGFILE}
|
1526
|
print_error_pfS
|
1527
|
fi
|
1528
|
MD=$(mdconfig -a -t vnode -f $MEMSTICKADIPATH)
|
1529
|
# Just in case
|
1530
|
trap "mdconfig -d -u ${MD}" 1 2 15 EXIT
|
1531
|
gpart create -s BSD ${MD} 2>&1 >> ${LOGFILE}
|
1532
|
gpart bootcode -b ${FINAL_CHROOT_DIR}/boot/boot ${MD} 2>&1 >> ${LOGFILE}
|
1533
|
gpart add -t freebsd-ufs ${MD} 2>&1 >> ${LOGFILE}
|
1534
|
trap "-" 1 2 15 EXIT
|
1535
|
mdconfig -d -u ${MD} 2>&1 >> ${LOGFILE}
|
1536
|
gzip -qf $MEMSTICKADIPATH &
|
1537
|
_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
|
1538
|
|
1539
|
echo ">>> MEMSTICKADI created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
|
1540
|
}
|
1541
|
|
1542
|
# Create pkg conf on desired place with desired arch/branch
|
1543
|
setup_pkg_repo() {
|
1544
|
if [ -z "${4}" ]; then
|
1545
|
return
|
1546
|
fi
|
1547
|
|
1548
|
local _template="${1}"
|
1549
|
local _target="${2}"
|
1550
|
local _arch="${3}"
|
1551
|
local _target_arch="${4}"
|
1552
|
local _staging="${5}"
|
1553
|
|
1554
|
if [ -z "${_template}" -o ! -f "${_template}" ]; then
|
1555
|
echo ">>> ERROR: It was not possible to find pkg conf template ${_template}"
|
1556
|
print_error_pfS
|
1557
|
fi
|
1558
|
|
1559
|
if [ -n "${_staging}" -a -n "${USE_PKG_REPO_STAGING}" ]; then
|
1560
|
local _pkg_repo_server_devel=${PKG_REPO_SERVER_STAGING}
|
1561
|
local _pkg_repo_branch_devel=${PKG_REPO_BRANCH_STAGING}
|
1562
|
local _pkg_repo_server_release=${PKG_REPO_SERVER_STAGING}
|
1563
|
local _pkg_repo_branch_release=${PKG_REPO_BRANCH_STAGING}
|
1564
|
else
|
1565
|
local _pkg_repo_server_devel=${PKG_REPO_SERVER_DEVEL}
|
1566
|
local _pkg_repo_branch_devel=${PKG_REPO_BRANCH_DEVEL}
|
1567
|
local _pkg_repo_server_release=${PKG_REPO_SERVER_RELEASE}
|
1568
|
local _pkg_repo_branch_release=${PKG_REPO_BRANCH_RELEASE}
|
1569
|
fi
|
1570
|
|
1571
|
mkdir -p $(dirname ${_target}) >/dev/null 2>&1
|
1572
|
|
1573
|
sed \
|
1574
|
-e "s/%%ARCH%%/${_target_arch}/" \
|
1575
|
-e "s/%%PKG_REPO_BRANCH_DEVEL%%/${_pkg_repo_branch_devel}/g" \
|
1576
|
-e "s/%%PKG_REPO_BRANCH_RELEASE%%/${_pkg_repo_branch_release}/g" \
|
1577
|
-e "s,%%PKG_REPO_SERVER_DEVEL%%,${_pkg_repo_server_devel},g" \
|
1578
|
-e "s,%%PKG_REPO_SERVER_RELEASE%%,${_pkg_repo_server_release},g" \
|
1579
|
-e "s/%%PRODUCT_NAME%%/${PRODUCT_NAME}/g" \
|
1580
|
${_template} \
|
1581
|
> ${_target}
|
1582
|
}
|
1583
|
|
1584
|
# This routine ensures any ports / binaries that the builder
|
1585
|
# system needs are on disk and ready for execution.
|
1586
|
builder_setup() {
|
1587
|
# If Product-builder is already installed, just leave
|
1588
|
if pkg info -e -q ${PRODUCT_NAME}-builder; then
|
1589
|
return
|
1590
|
fi
|
1591
|
|
1592
|
if [ ! -f ${PKG_REPO_PATH} ]; then
|
1593
|
[ -d $(dirname ${PKG_REPO_PATH}) ] \
|
1594
|
|| mkdir -p $(dirname ${PKG_REPO_PATH})
|
1595
|
|
1596
|
update_freebsd_sources
|
1597
|
|
1598
|
local _arch=$(uname -m)
|
1599
|
setup_pkg_repo \
|
1600
|
${PKG_REPO_DEFAULT} \
|
1601
|
${PKG_REPO_PATH} \
|
1602
|
${_arch} \
|
1603
|
${_arch} \
|
1604
|
"staging"
|
1605
|
|
1606
|
# Use fingerprint keys from repo
|
1607
|
sed -i '' -e "/fingerprints:/ s,\"/,\"${BUILDER_ROOT}/src/," \
|
1608
|
${PKG_REPO_PATH}
|
1609
|
fi
|
1610
|
|
1611
|
pkg install ${PRODUCT_NAME}-builder
|
1612
|
}
|
1613
|
|
1614
|
# Updates FreeBSD sources
|
1615
|
update_freebsd_sources() {
|
1616
|
if [ "${1}" = "full" ]; then
|
1617
|
local _full=1
|
1618
|
local _clone_params=""
|
1619
|
else
|
1620
|
local _full=0
|
1621
|
local _clone_params="--depth 1 --single-branch"
|
1622
|
fi
|
1623
|
|
1624
|
if [ ! -d "${FREEBSD_SRC_DIR}" ]; then
|
1625
|
mkdir -p ${FREEBSD_SRC_DIR}
|
1626
|
fi
|
1627
|
|
1628
|
if [ -n "${NO_BUILDWORLD}" -a -n "${NO_BUILDKERNEL}" ]; then
|
1629
|
echo ">>> NO_BUILDWORLD and NO_BUILDKERNEL set, skipping update of freebsd sources" | tee -a ${LOGFILE}
|
1630
|
return
|
1631
|
fi
|
1632
|
|
1633
|
echo -n ">>> Obtaining FreeBSD sources ${FREEBSD_BRANCH}..."
|
1634
|
local _FREEBSD_BRANCH=${FREEBSD_BRANCH:-"devel"}
|
1635
|
local _CLONE=1
|
1636
|
|
1637
|
if [ -d "${FREEBSD_SRC_DIR}/.git" ]; then
|
1638
|
CUR_BRANCH=$(cd ${FREEBSD_SRC_DIR} && git branch | grep '^\*' | cut -d' ' -f2)
|
1639
|
if [ ${_full} -eq 0 -a "${CUR_BRANCH}" = "${_FREEBSD_BRANCH}" ]; then
|
1640
|
_CLONE=0
|
1641
|
( cd ${FREEBSD_SRC_DIR} && git clean -fd; git fetch origin; git reset --hard origin/${_FREEBSD_BRANCH} ) 2>&1 | grep -C3 -i -E 'error|fatal'
|
1642
|
else
|
1643
|
rm -rf ${FREEBSD_SRC_DIR}
|
1644
|
fi
|
1645
|
fi
|
1646
|
|
1647
|
if [ ${_CLONE} -eq 1 ]; then
|
1648
|
( git clone --branch ${_FREEBSD_BRANCH} ${_clone_params} ${FREEBSD_REPO_BASE} ${FREEBSD_SRC_DIR} ) 2>&1 | grep -C3 -i -E 'error|fatal'
|
1649
|
fi
|
1650
|
|
1651
|
if [ ! -d "${FREEBSD_SRC_DIR}/.git" ]; then
|
1652
|
echo ">>> ERROR: It was not possible to clone FreeBSD src repo"
|
1653
|
print_error_pfS
|
1654
|
fi
|
1655
|
|
1656
|
if [ -n "${GIT_FREEBSD_COSHA1}" ]; then
|
1657
|
( cd ${FREEBSD_SRC_DIR} && git checkout ${GIT_FREEBSD_COSHA1} ) 2>&1 | grep -C3 -i -E 'error|fatal'
|
1658
|
fi
|
1659
|
echo "Done!"
|
1660
|
}
|
1661
|
|
1662
|
pkg_chroot() {
|
1663
|
local _root="${1}"
|
1664
|
shift
|
1665
|
|
1666
|
if [ $# -eq 0 ]; then
|
1667
|
return -1
|
1668
|
fi
|
1669
|
|
1670
|
if [ -z "${_root}" -o "${_root}" = "/" -o ! -d "${_root}" ]; then
|
1671
|
return -1
|
1672
|
fi
|
1673
|
|
1674
|
mkdir -p \
|
1675
|
${SCRATCHDIR}/pkg_cache \
|
1676
|
${_root}/var/cache/pkg \
|
1677
|
${_root}/dev
|
1678
|
|
1679
|
/sbin/mount -t nullfs ${SCRATCHDIR}/pkg_cache ${_root}/var/cache/pkg
|
1680
|
/sbin/mount -t devfs devfs ${_root}/dev
|
1681
|
cp -f /etc/resolv.conf ${_root}/etc/resolv.conf
|
1682
|
touch ${BUILDER_LOGS}/install_pkg_install_ports.txt
|
1683
|
script -aq ${BUILDER_LOGS}/install_pkg_install_ports.txt pkg -c ${_root} $@ >/dev/null 2>&1
|
1684
|
local result=$?
|
1685
|
rm -f ${_root}/etc/resolv.conf
|
1686
|
/sbin/umount -f ${_root}/dev
|
1687
|
/sbin/umount -f ${_root}/var/cache/pkg
|
1688
|
|
1689
|
return $result
|
1690
|
}
|
1691
|
|
1692
|
|
1693
|
pkg_chroot_add() {
|
1694
|
if [ -z "${1}" -o -z "${2}" ]; then
|
1695
|
return 1
|
1696
|
fi
|
1697
|
|
1698
|
local _target="${1}"
|
1699
|
local _pkg="$(get_pkg_name ${2}).txz"
|
1700
|
|
1701
|
if [ ! -d "${_target}" ]; then
|
1702
|
echo ">>> ERROR: Target dir ${_target} not found"
|
1703
|
print_error_pfS
|
1704
|
fi
|
1705
|
|
1706
|
if [ ! -f ${CORE_PKG_REAL_PATH}/All/${_pkg} ]; then
|
1707
|
echo ">>> ERROR: Package ${_pkg} not found"
|
1708
|
print_error_pfS
|
1709
|
fi
|
1710
|
|
1711
|
cp ${CORE_PKG_REAL_PATH}/All/${_pkg} ${_target}
|
1712
|
pkg_chroot ${_target} add /${_pkg}
|
1713
|
rm -f ${_target}/${_pkg}
|
1714
|
}
|
1715
|
|
1716
|
pkg_bootstrap() {
|
1717
|
local _root=${1:-"${STAGE_CHROOT_DIR}"}
|
1718
|
|
1719
|
setup_pkg_repo \
|
1720
|
${PKG_REPO_DEFAULT} \
|
1721
|
${_root}${PKG_REPO_PATH} \
|
1722
|
${TARGET} \
|
1723
|
${TARGET_ARCH} \
|
1724
|
"staging"
|
1725
|
|
1726
|
pkg_chroot ${_root} bootstrap -f
|
1727
|
}
|
1728
|
|
1729
|
# This routine assists with installing various
|
1730
|
# freebsd ports files into the pfsense-fs staging
|
1731
|
# area.
|
1732
|
install_pkg_install_ports() {
|
1733
|
local MAIN_PKG="${1}"
|
1734
|
|
1735
|
if [ -z "${MAIN_PKG}" ]; then
|
1736
|
MAIN_PKG=${PRODUCT_NAME}
|
1737
|
fi
|
1738
|
|
1739
|
echo ">>> Installing pkg repository in chroot (${STAGE_CHROOT_DIR})..."
|
1740
|
|
1741
|
[ -d ${STAGE_CHROOT_DIR}/var/cache/pkg ] || \
|
1742
|
mkdir -p ${STAGE_CHROOT_DIR}/var/cache/pkg
|
1743
|
|
1744
|
[ -d ${SCRATCHDIR}/pkg_cache ] || \
|
1745
|
mkdir -p ${SCRATCHDIR}/pkg_cache
|
1746
|
|
1747
|
echo -n ">>> Installing built ports (packages) in chroot (${STAGE_CHROOT_DIR})... "
|
1748
|
# First mark all packages as automatically installed
|
1749
|
pkg_chroot ${STAGE_CHROOT_DIR} set -A 1 -a
|
1750
|
# Install all necessary packages
|
1751
|
if ! pkg_chroot ${STAGE_CHROOT_DIR} install ${MAIN_PKG} ${custom_package_list}; then
|
1752
|
echo "Failed!"
|
1753
|
print_error_pfS
|
1754
|
fi
|
1755
|
# Make sure required packages are set as non-automatic
|
1756
|
pkg_chroot ${STAGE_CHROOT_DIR} set -A 0 pkg ${MAIN_PKG} ${custom_package_list}
|
1757
|
# Remove unnecessary packages
|
1758
|
pkg_chroot ${STAGE_CHROOT_DIR} autoremove
|
1759
|
echo "Done!"
|
1760
|
}
|
1761
|
|
1762
|
install_bsdinstaller() {
|
1763
|
local _params=""
|
1764
|
|
1765
|
# Use staging repo on RELEASE
|
1766
|
if [ -n "${_IS_RELEASE}" ]; then
|
1767
|
mkdir -p ${FINAL_CHROOT_DIR}/tmp/pkg-repo
|
1768
|
cp -f ${STAGE_CHROOT_DIR}${PKG_REPO_PATH} \
|
1769
|
${FINAL_CHROOT_DIR}/tmp/pkg-repo
|
1770
|
_params="--repo-conf-dir /tmp/pkg-repo "
|
1771
|
fi
|
1772
|
|
1773
|
echo ">>> Installing BSDInstaller in chroot (${FINAL_CHROOT_DIR})... (starting)"
|
1774
|
pkg_chroot ${FINAL_CHROOT_DIR} ${_params}install -f bsdinstaller
|
1775
|
sed -i '' -e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME}," \
|
1776
|
-e "s,%%PRODUCT_VERSION%%,${PRODUCT_VERSION}," \
|
1777
|
-e "s,%%ARCH%%,${TARGET}," \
|
1778
|
${FINAL_CHROOT_DIR}/usr/local/share/dfuibe_lua/conf/pfSense.lua \
|
1779
|
${FINAL_CHROOT_DIR}/usr/local/share/dfuibe_lua/conf/pfSense_rescue.lua
|
1780
|
if [ -n "${_IS_RELEASE}" ]; then
|
1781
|
rm -rf ${FINAL_CHROOT_DIR}/tmp/pkg-repo
|
1782
|
fi
|
1783
|
echo ">>> Installing BSDInstaller in chroot (${FINAL_CHROOT_DIR})... (finished)"
|
1784
|
}
|
1785
|
|
1786
|
staginareas_clean_each_run() {
|
1787
|
echo -n ">>> Cleaning build directories: "
|
1788
|
if [ -d "${FINAL_CHROOT_DIR}" ]; then
|
1789
|
BASENAME=$(basename ${FINAL_CHROOT_DIR})
|
1790
|
echo -n "$BASENAME "
|
1791
|
chflags -R noschg ${FINAL_CHROOT_DIR} 2>&1 >/dev/null
|
1792
|
rm -rf ${FINAL_CHROOT_DIR}/* 2>/dev/null
|
1793
|
fi
|
1794
|
echo "Done!"
|
1795
|
}
|
1796
|
|
1797
|
# Imported from FreeSBIE
|
1798
|
buildkernel() {
|
1799
|
if [ -n "${NO_BUILDKERNEL}" ]; then
|
1800
|
echo ">>> NO_BUILDKERNEL set, skipping build" | tee -a ${LOGFILE}
|
1801
|
return
|
1802
|
fi
|
1803
|
|
1804
|
if [ -z "${KERNCONF}" ]; then
|
1805
|
echo ">>> ERROR: No kernel configuration defined probably this is not what you want! STOPPING!" | tee -a ${LOGFILE}
|
1806
|
print_error_pfS
|
1807
|
fi
|
1808
|
|
1809
|
if [ -n "${KERNELCONF}" ]; then
|
1810
|
export KERNCONFDIR=$(dirname ${KERNELCONF})
|
1811
|
export KERNCONF=$(basename ${KERNELCONF})
|
1812
|
fi
|
1813
|
|
1814
|
SRCCONFBASENAME=$(basename ${SRC_CONF})
|
1815
|
echo ">>> KERNCONFDIR: ${KERNCONFDIR}"
|
1816
|
echo ">>> ARCH: ${TARGET}"
|
1817
|
echo ">>> SRC_CONF: ${SRCCONFBASENAME}"
|
1818
|
|
1819
|
makeargs="${MAKEJ_KERNEL} SRCCONF=${SRC_CONF} __MAKE_CONF=${MAKE_CONF} TARGET_ARCH=${TARGET_ARCH} TARGET=${TARGET}"
|
1820
|
echo ">>> Builder is running the command: script -aq $LOGFILE make -DNO_KERNELCLEAN $makeargs buildkernel KERNCONF=${KERNCONF}" | tee -a $LOGFILE
|
1821
|
(script -q $LOGFILE make -C ${FREEBSD_SRC_DIR} -DNO_KERNELCLEAN $makeargs buildkernel KERNCONF=${KERNCONF} || print_error_pfS;) | egrep '^>>>'
|
1822
|
}
|
1823
|
|
1824
|
# Imported from FreeSBIE
|
1825
|
installkernel() {
|
1826
|
if [ -z "${KERNCONF}" ]; then
|
1827
|
echo ">>> ERROR: No kernel configuration defined probably this is not what you want! STOPPING!" | tee -a ${LOGFILE}
|
1828
|
print_error_pfS
|
1829
|
fi
|
1830
|
|
1831
|
if [ -n "${KERNELCONF}" ]; then
|
1832
|
export KERNCONFDIR=$(dirname ${KERNELCONF})
|
1833
|
export KERNCONF=$(basename ${KERNELCONF})
|
1834
|
fi
|
1835
|
|
1836
|
mkdir -p ${STAGE_CHROOT_DIR}/boot
|
1837
|
makeargs="${MAKEJ_KERNEL} SRCCONF=${SRC_CONF} __MAKE_CONF=${MAKE_CONF} TARGET_ARCH=${TARGET_ARCH} TARGET=${TARGET} DESTDIR=${KERNEL_DESTDIR}"
|
1838
|
echo ">>> Builder is running the command: script -aq $LOGFILE make ${makeargs} installkernel KERNCONF=${KERNCONF}" | tee -a $LOGFILE
|
1839
|
(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} installkernel KERNCONF=${KERNCONF} || print_error_pfS;) | egrep '^>>>'
|
1840
|
gzip -f9 $KERNEL_DESTDIR/boot/kernel/kernel
|
1841
|
}
|
1842
|
|
1843
|
# Launch is ran first to setup a few variables that we need
|
1844
|
# Imported from FreeSBIE
|
1845
|
launch() {
|
1846
|
if [ "$(id -u)" != "0" ]; then
|
1847
|
echo "Sorry, this must be done as root."
|
1848
|
fi
|
1849
|
|
1850
|
echo ">>> Operation $0 has started at $(date)"
|
1851
|
}
|
1852
|
|
1853
|
finish() {
|
1854
|
echo ">>> Operation $0 has ended at $(date)"
|
1855
|
}
|
1856
|
|
1857
|
pkg_repo_rsync() {
|
1858
|
local _repo_path_param="${1}"
|
1859
|
|
1860
|
if [ -z "${_repo_path_param}" -o ! -d "${_repo_path_param}" ]; then
|
1861
|
return
|
1862
|
fi
|
1863
|
|
1864
|
# Sanitize path
|
1865
|
_repo_path=$(realpath ${_repo_path_param})
|
1866
|
|
1867
|
local _repo_dir=$(dirname ${_repo_path})
|
1868
|
local _repo_base=$(basename ${_repo_path})
|
1869
|
|
1870
|
# Add ./ it's an rsync trick to make it chdir to directory before sending it
|
1871
|
_repo_path="${_repo_dir}/./${_repo_base}"
|
1872
|
|
1873
|
if [ -z "${LOGFILE}" ]; then
|
1874
|
local _logfile="/dev/null"
|
1875
|
else
|
1876
|
local _logfile="${LOGFILE}"
|
1877
|
fi
|
1878
|
|
1879
|
if [ -n "${PKG_REPO_SIGNING_COMMAND}" ]; then
|
1880
|
|
1881
|
# Detect poudriere directory structure
|
1882
|
if [ -L "${_repo_path}/.latest" ]; then
|
1883
|
local _real_repo_path=$(readlink -f ${_repo_path}/.latest)
|
1884
|
else
|
1885
|
local _real_repo_path=${_repo_path}
|
1886
|
fi
|
1887
|
|
1888
|
echo -n ">>> Signing repository... " | tee -a ${_logfile}
|
1889
|
############ ATTENTION ##############
|
1890
|
#
|
1891
|
# For some reason pkg-repo fail without / in the end of directory name
|
1892
|
# so removing it will break command
|
1893
|
#
|
1894
|
# https://github.com/freebsd/pkg/issues/1364
|
1895
|
#
|
1896
|
if script -aq ${_logfile} pkg repo ${_real_repo_path}/ \
|
1897
|
signing_command: ${PKG_REPO_SIGNING_COMMAND} >/dev/null 2>&1; then
|
1898
|
echo "Done!" | tee -a ${_logfile}
|
1899
|
else
|
1900
|
echo "Failed!" | tee -a ${_logfile}
|
1901
|
echo ">>> ERROR: An error occurred trying to sign repo"
|
1902
|
print_error_pfS
|
1903
|
fi
|
1904
|
|
1905
|
local _pkgfile="${_repo_path}/Latest/pkg.txz"
|
1906
|
if [ -e ${_pkgfile} ]; then
|
1907
|
echo -n ">>> Signing Latest/pkg.txz for bootstraping... " | tee -a ${_logfile}
|
1908
|
|
1909
|
if sha256 -q ${_pkgfile} | ${PKG_REPO_SIGNING_COMMAND} \
|
1910
|
> ${_pkgfile}.sig 2>/dev/null; then
|
1911
|
echo "Done!" | tee -a ${_logfile}
|
1912
|
else
|
1913
|
echo "Failed!" | tee -a ${_logfile}
|
1914
|
echo ">>> ERROR: An error occurred trying to sign Latest/pkg.txz"
|
1915
|
print_error_pfS
|
1916
|
fi
|
1917
|
fi
|
1918
|
fi
|
1919
|
|
1920
|
if [ -n "${DO_NOT_UPLOAD}" ]; then
|
1921
|
return
|
1922
|
fi
|
1923
|
|
1924
|
# Make sure destination directory exist
|
1925
|
ssh -p ${PKG_RSYNC_SSH_PORT} \
|
1926
|
${PKG_RSYNC_USERNAME}@${PKG_RSYNC_HOSTNAME} \
|
1927
|
"mkdir -p ${PKG_RSYNC_DESTDIR}"
|
1928
|
|
1929
|
echo -n ">>> Sending updated repository to ${PKG_RSYNC_HOSTNAME}... " | tee -a ${_logfile}
|
1930
|
if script -aq ${_logfile} rsync -ave "ssh -p ${PKG_RSYNC_SSH_PORT}" \
|
1931
|
--timeout=60 --delete-delay ${_repo_path} \
|
1932
|
${PKG_RSYNC_USERNAME}@${PKG_RSYNC_HOSTNAME}:${PKG_RSYNC_DESTDIR} >/dev/null 2>&1
|
1933
|
then
|
1934
|
echo "Done!" | tee -a ${_logfile}
|
1935
|
else
|
1936
|
echo "Failed!" | tee -a ${_logfile}
|
1937
|
echo ">>> ERROR: An error occurred sending repo to remote hostname"
|
1938
|
print_error_pfS
|
1939
|
fi
|
1940
|
|
1941
|
if [ -z "${USE_PKG_REPO_STAGING}" -o -n "${SKIP_FINAL_RSYNC}" ]; then
|
1942
|
return
|
1943
|
fi
|
1944
|
|
1945
|
if [ -n "${_IS_RELEASE}" -o "${_repo_path_param}" = "${CORE_PKG_PATH}" ]; then
|
1946
|
local _cmd="rsync -ave \"ssh -p ${PKG_FINAL_RSYNC_SSH_PORT}\" \
|
1947
|
--timeout=60 --delete-delay ${PKG_RSYNC_DESTDIR}/./${_repo_base%%-core}* \
|
1948
|
${PKG_FINAL_RSYNC_USERNAME}@${PKG_FINAL_RSYNC_HOSTNAME}:${PKG_FINAL_RSYNC_DESTDIR}"
|
1949
|
|
1950
|
echo -n ">>> Sending updated repositories to ${PKG_FINAL_RSYNC_HOSTNAME}... " | tee -a ${_logfile}
|
1951
|
if script -aq ${_logfile} ssh -p ${PKG_RSYNC_SSH_PORT} \
|
1952
|
${PKG_RSYNC_USERNAME}@${PKG_RSYNC_HOSTNAME} ${_cmd} >/dev/null 2>&1; then
|
1953
|
echo "Done!" | tee -a ${_logfile}
|
1954
|
else
|
1955
|
echo "Failed!" | tee -a ${_logfile}
|
1956
|
echo ">>> ERROR: An error occurred sending repo to final hostname"
|
1957
|
print_error_pfS
|
1958
|
fi
|
1959
|
fi
|
1960
|
}
|
1961
|
|
1962
|
poudriere_create_patch() {
|
1963
|
local _jail_patch="${SCRATCHDIR}/poudriere_jail.${POUDRIERE_BRANCH}.patch"
|
1964
|
|
1965
|
if [ -z "${FREEBSD_PARENT_BRANCH}" ]; then
|
1966
|
echo ">>> ERROR: FREEBSD_PARENT_BRANCH is not set"
|
1967
|
fi
|
1968
|
|
1969
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
1970
|
|
1971
|
# Get FreeBSD source and apply patches
|
1972
|
update_freebsd_sources full
|
1973
|
|
1974
|
[ -f "${_jail_patch}" ] && \
|
1975
|
rm -f "${_jail_patch}"
|
1976
|
|
1977
|
# Create a big patch with all our changes to use on jail
|
1978
|
( \
|
1979
|
cd ${FREEBSD_SRC_DIR} && \
|
1980
|
git diff $(git merge-base origin/${FREEBSD_PARENT_BRANCH} ${FREEBSD_BRANCH}) > ${_jail_patch}
|
1981
|
) >/dev/null 2>&1
|
1982
|
|
1983
|
# Check if patch was created
|
1984
|
if [ ! -s "${_jail_patch}" ]; then
|
1985
|
echo ">>> ERROR: Patch does not exist or is empty, aborting..." | tee -a ${LOGFILE}
|
1986
|
print_error_pfS
|
1987
|
fi
|
1988
|
}
|
1989
|
|
1990
|
poudriere_possible_archs() {
|
1991
|
local _arch=$(uname -m)
|
1992
|
local _archs="i386.i386"
|
1993
|
|
1994
|
# If host is amd64, we'll create both repos, and if possible armv6
|
1995
|
if [ "${_arch}" = "amd64" ]; then
|
1996
|
_archs="amd64.amd64 ${_archs}"
|
1997
|
|
1998
|
if [ -f /usr/local/bin/qemu-arm-static ]; then
|
1999
|
# Make sure binmiscctl is ok
|
2000
|
/usr/local/etc/rc.d/qemu_user_static forcestart >/dev/null 2>&1
|
2001
|
|
2002
|
if binmiscctl lookup armv6 >/dev/null 2>&1; then
|
2003
|
_archs="${_archs} arm.armv6"
|
2004
|
fi
|
2005
|
fi
|
2006
|
fi
|
2007
|
|
2008
|
if [ -n "${ARCH_LIST}" ]; then
|
2009
|
local _found=0
|
2010
|
for _desired_arch in ${ARCH_LIST}; do
|
2011
|
_found=0
|
2012
|
for _possible_arch in ${_archs}; do
|
2013
|
if [ "${_desired_arch}" = "${_possible_arch}" ]; then
|
2014
|
_found=1
|
2015
|
break
|
2016
|
fi
|
2017
|
done
|
2018
|
if [ ${_found} -eq 0 ]; then
|
2019
|
echo ">>> ERROR: Impossible to build for arch: ${_desired_arch}"
|
2020
|
print_error_pfS
|
2021
|
fi
|
2022
|
done
|
2023
|
_archs="${ARCH_LIST}"
|
2024
|
fi
|
2025
|
|
2026
|
echo ${_archs}
|
2027
|
}
|
2028
|
|
2029
|
poudriere_jail_name() {
|
2030
|
local _jail_arch="${1}"
|
2031
|
|
2032
|
if [ -z "${_jail_arch}" ]; then
|
2033
|
return 1
|
2034
|
fi
|
2035
|
|
2036
|
# Remove arch
|
2037
|
echo "${PRODUCT_NAME}_${POUDRIERE_BRANCH}_${_jail_arch##*.}"
|
2038
|
}
|
2039
|
|
2040
|
poudriere_rename_ports() {
|
2041
|
if [ "${PRODUCT_NAME}" = "pfSense" ]; then
|
2042
|
return;
|
2043
|
fi
|
2044
|
|
2045
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
2046
|
|
2047
|
local _ports_dir="/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}"
|
2048
|
|
2049
|
echo -n ">>> Renaming product ports on ${POUDRIERE_PORTS_NAME}... " | tee -a ${LOGFILE}
|
2050
|
for d in $(find ${_ports_dir} -depth 2 -type d -name '*pfSense*'); do
|
2051
|
local _pdir=$(dirname ${d})
|
2052
|
local _pname=$(echo $(basename ${d}) | sed "s,pfSense,${PRODUCT_NAME},")
|
2053
|
local _plist=""
|
2054
|
|
2055
|
if [ -e ${_pdir}/${_pname} ]; then
|
2056
|
rm -rf ${_pdir}/${_pname}
|
2057
|
fi
|
2058
|
|
2059
|
cp -r ${d} ${_pdir}/${_pname}
|
2060
|
|
2061
|
if [ -f ${_pdir}/${_pname}/pkg-plist ]; then
|
2062
|
_plist=${_pdir}/${_pname}/pkg-plist
|
2063
|
fi
|
2064
|
|
2065
|
sed -i '' -e "s,pfSense,${PRODUCT_NAME},g" \
|
2066
|
-e "s,https://www.pfsense.org,${PRODUCT_URL},g" \
|
2067
|
-e "/^MAINTAINER=/ s,^.*$,MAINTAINER= ${PRODUCT_EMAIL}," \
|
2068
|
${_pdir}/${_pname}/Makefile \
|
2069
|
${_pdir}/${_pname}/pkg-descr ${_plist}
|
2070
|
|
2071
|
# PHP module is special
|
2072
|
if echo "${_pname}" | grep -q "^php[0-9]*-${PRODUCT_NAME}-module"; then
|
2073
|
local _product_capital=$(echo ${PRODUCT_NAME} | tr '[a-z]' '[A-Z]')
|
2074
|
sed -i '' -e "s,PHP_PFSENSE,PHP_${_product_capital},g" \
|
2075
|
-e "s,PFSENSE_SHARED_LIBADD,${_product_capital}_SHARED_LIBADD,g" \
|
2076
|
-e "s,pfSense,${PRODUCT_NAME},g" \
|
2077
|
-e "s,${PRODUCT_NAME}\.c,pfSense.c,g" \
|
2078
|
${_pdir}/${_pname}/files/config.m4
|
2079
|
|
2080
|
sed -i '' -e "s,COMPILE_DL_PFSENSE,COMPILE_DL_${_product_capital}," \
|
2081
|
-e "s,pfSense_module_entry,${PRODUCT_NAME}_module_entry,g" \
|
2082
|
-e "/ZEND_GET_MODULE/ s,pfSense,${PRODUCT_NAME}," \
|
2083
|
-e "/PHP_PFSENSE_WORLD_EXTNAME/ s,pfSense,${PRODUCT_NAME}," \
|
2084
|
${_pdir}/${_pname}/files/pfSense.c \
|
2085
|
${_pdir}/${_pname}/files/php_pfSense.h
|
2086
|
fi
|
2087
|
|
2088
|
if [ -d ${_pdir}/${_pname}/files ]; then
|
2089
|
for fd in $(find ${_pdir}/${_pname}/files -type d -name '*pfSense*'); do
|
2090
|
local _fddir=$(dirname ${fd})
|
2091
|
local _fdname=$(echo $(basename ${fd}) | sed "s,pfSense,${PRODUCT_NAME},")
|
2092
|
|
2093
|
mv ${fd} ${_fddir}/${_fdname}
|
2094
|
done
|
2095
|
fi
|
2096
|
done
|
2097
|
echo "Done!" | tee -a ${LOGFILE}
|
2098
|
}
|
2099
|
|
2100
|
poudriere_create_ports_tree() {
|
2101
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
2102
|
|
2103
|
if ! poudriere ports -l | grep -q -E "^${POUDRIERE_PORTS_NAME}[[:blank:]]"; then
|
2104
|
local _branch=""
|
2105
|
if [ -z "${POUDRIERE_PORTS_GIT_URL}" ]; then
|
2106
|
echo ">>> ERROR: POUDRIERE_PORTS_GIT_URL is not defined"
|
2107
|
print_error_pfS
|
2108
|
fi
|
2109
|
if [ -n "${POUDRIERE_PORTS_GIT_BRANCH}" ]; then
|
2110
|
_branch="-B ${POUDRIERE_PORTS_GIT_BRANCH}"
|
2111
|
fi
|
2112
|
echo -n ">>> Creating poudriere ports tree, it may take some time... " | tee -a ${LOGFILE}
|
2113
|
if ! script -aq ${LOGFILE} poudriere ports -c -p "${POUDRIERE_PORTS_NAME}" -m git ${_branch} >/dev/null 2>&1; then
|
2114
|
echo "" | tee -a ${LOGFILE}
|
2115
|
echo ">>> ERROR: Error creating poudriere ports tree, aborting..." | tee -a ${LOGFILE}
|
2116
|
print_error_pfS
|
2117
|
fi
|
2118
|
echo "Done!" | tee -a ${LOGFILE}
|
2119
|
poudriere_rename_ports
|
2120
|
fi
|
2121
|
}
|
2122
|
|
2123
|
poudriere_init() {
|
2124
|
local _error=0
|
2125
|
local _archs=$(poudriere_possible_archs)
|
2126
|
local _jail_patch="${SCRATCHDIR}/poudriere_jail.${POUDRIERE_BRANCH}.patch"
|
2127
|
|
2128
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
2129
|
|
2130
|
# Sanity checks
|
2131
|
if [ -z "${ZFS_TANK}" ]; then
|
2132
|
echo ">>> ERROR: \$ZFS_TANK is empty" | tee -a ${LOGFILE}
|
2133
|
error=1
|
2134
|
fi
|
2135
|
|
2136
|
if [ -z "${ZFS_ROOT}" ]; then
|
2137
|
echo ">>> ERROR: \$ZFS_ROOT is empty" | tee -a ${LOGFILE}
|
2138
|
error=1
|
2139
|
fi
|
2140
|
|
2141
|
if [ -z "${POUDRIERE_PORTS_NAME}" ]; then
|
2142
|
echo ">>> ERROR: \$POUDRIERE_PORTS_NAME is empty" | tee -a ${LOGFILE}
|
2143
|
error=1
|
2144
|
fi
|
2145
|
|
2146
|
if [ ${_error} -eq 1 ]; then
|
2147
|
print_error_pfS
|
2148
|
fi
|
2149
|
|
2150
|
# Check if zpool exists
|
2151
|
if ! zpool list ${ZFS_TANK} >/dev/null 2>&1; then
|
2152
|
echo ">>> ERROR: ZFS tank ${ZFS_TANK} not found, please create it and try again..." | tee -a ${LOGFILE}
|
2153
|
print_error_pfS
|
2154
|
fi
|
2155
|
|
2156
|
# Check if zfs rootfs exists
|
2157
|
if ! zfs list ${ZFS_TANK}${ZFS_ROOT} >/dev/null 2>&1; then
|
2158
|
echo -n ">>> Creating ZFS filesystem ${ZFS_TANK}${ZFS_ROOT}... "
|
2159
|
if zfs create -o atime=off -o mountpoint=/usr/local${ZFS_ROOT} \
|
2160
|
${ZFS_TANK}${ZFS_ROOT} >/dev/null 2>&1; then
|
2161
|
echo "Done!"
|
2162
|
else
|
2163
|
echo "Failed!"
|
2164
|
print_error_pfS
|
2165
|
fi
|
2166
|
fi
|
2167
|
|
2168
|
# Make sure poudriere is installed
|
2169
|
if ! pkg info --quiet poudriere; then
|
2170
|
echo ">>> Installing poudriere..." | tee -a ${LOGFILE}
|
2171
|
if ! pkg install poudriere >/dev/null 2>&1; then
|
2172
|
echo ">>> ERROR: poudriere was not installed, aborting..." | tee -a ${LOGFILE}
|
2173
|
print_error_pfS
|
2174
|
fi
|
2175
|
fi
|
2176
|
|
2177
|
# Create poudriere.conf
|
2178
|
if [ -z "${POUDRIERE_PORTS_GIT_URL}" ]; then
|
2179
|
echo ">>> ERROR: POUDRIERE_PORTS_GIT_URL is not defined"
|
2180
|
print_error_pfS
|
2181
|
fi
|
2182
|
echo ">>> Creating poudriere.conf" | tee -a ${LOGFILE}
|
2183
|
cat <<EOF >/usr/local/etc/poudriere.conf
|
2184
|
ZPOOL=${ZFS_TANK}
|
2185
|
ZROOTFS=${ZFS_ROOT}
|
2186
|
RESOLV_CONF=/etc/resolv.conf
|
2187
|
BASEFS=/usr/local/poudriere
|
2188
|
USE_PORTLINT=no
|
2189
|
USE_TMPFS=yes
|
2190
|
NOLINUX=yes
|
2191
|
DISTFILES_CACHE=/usr/ports/distfiles
|
2192
|
CHECK_CHANGED_OPTIONS=yes
|
2193
|
CHECK_CHANGED_DEPS=yes
|
2194
|
ATOMIC_PACKAGE_REPOSITORY=yes
|
2195
|
COMMIT_PACKAGES_ON_FAILURE=no
|
2196
|
KEEP_OLD_PACKAGES=yes
|
2197
|
KEEP_OLD_PACKAGES_COUNT=5
|
2198
|
EOF
|
2199
|
|
2200
|
# Create specific items conf
|
2201
|
[ ! -d /usr/local/etc/poudriere.d ] \
|
2202
|
&& mkdir -p /usr/local/etc/poudriere.d
|
2203
|
|
2204
|
cat <<EOF >/usr/local/etc/poudriere.d/${POUDRIERE_PORTS_NAME}-poudriere.conf
|
2205
|
GIT_URL="${POUDRIERE_PORTS_GIT_URL}"
|
2206
|
EOF
|
2207
|
|
2208
|
# Create DISTFILES_CACHE if it doesn't exist
|
2209
|
if [ ! -d /usr/ports/distfiles ]; then
|
2210
|
mkdir -p /usr/ports/distfiles
|
2211
|
fi
|
2212
|
|
2213
|
# Remove old jails
|
2214
|
for jail_arch in ${_archs}; do
|
2215
|
jail_name=$(poudriere_jail_name ${jail_arch})
|
2216
|
|
2217
|
if poudriere jail -i -j "${jail_name}" >/dev/null 2>&1; then
|
2218
|
echo ">>> Poudriere jail ${jail_name} already exists, deleting it..." | tee -a ${LOGFILE}
|
2219
|
poudriere jail -d -j "${jail_name}" >/dev/null 2>&1
|
2220
|
fi
|
2221
|
done
|
2222
|
|
2223
|
# Remove old ports tree
|
2224
|
if poudriere ports -l | grep -q -E "^${POUDRIERE_PORTS_NAME}[[:blank:]]"; then
|
2225
|
echo ">>> Poudriere ports tree ${POUDRIERE_PORTS_NAME} already exists, deleting it..." | tee -a ${LOGFILE}
|
2226
|
poudriere ports -d -p "${POUDRIERE_PORTS_NAME}"
|
2227
|
fi
|
2228
|
|
2229
|
poudriere_create_patch
|
2230
|
|
2231
|
local native_xtools=""
|
2232
|
# Now we are ready to create jails
|
2233
|
for jail_arch in ${_archs}; do
|
2234
|
jail_name=$(poudriere_jail_name ${jail_arch})
|
2235
|
|
2236
|
if [ "${jail_arch}" = "arm.armv6" ]; then
|
2237
|
native_xtools="-x"
|
2238
|
else
|
2239
|
native_xtools=""
|
2240
|
fi
|
2241
|
|
2242
|
echo -n ">>> Creating jail ${jail_name}, it may take some time... " | tee -a ${LOGFILE}
|
2243
|
# XXX: Change -m to git when it's available in poudriere
|
2244
|
if ! script -aq ${LOGFILE} poudriere jail -c -j "${jail_name}" -v ${FREEBSD_PARENT_BRANCH} \
|
2245
|
-a ${jail_arch} -m svn -P ${_jail_patch} ${native_xtools} >/dev/null 2>&1; then
|
2246
|
echo "" | tee -a ${LOGFILE}
|
2247
|
echo ">>> ERROR: Error creating jail ${jail_name}, aborting..." | tee -a ${LOGFILE}
|
2248
|
print_error_pfS
|
2249
|
fi
|
2250
|
echo "Done!" | tee -a ${LOGFILE}
|
2251
|
done
|
2252
|
|
2253
|
poudriere_create_ports_tree
|
2254
|
|
2255
|
echo ">>> Poudriere is now configured!" | tee -a ${LOGFILE}
|
2256
|
}
|
2257
|
|
2258
|
poudriere_update_jails() {
|
2259
|
local _archs=$(poudriere_possible_archs)
|
2260
|
local _jail_patch="${SCRATCHDIR}/poudriere_jail.${POUDRIERE_BRANCH}.patch"
|
2261
|
|
2262
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
2263
|
|
2264
|
poudriere_create_patch
|
2265
|
|
2266
|
local native_xtools=""
|
2267
|
for jail_arch in ${_archs}; do
|
2268
|
jail_name=$(poudriere_jail_name ${jail_arch})
|
2269
|
|
2270
|
local _create_or_update="-u"
|
2271
|
local _create_or_update_text="Updating"
|
2272
|
if ! poudriere jail -i -j "${jail_name}" >/dev/null 2>&1; then
|
2273
|
echo ">>> Poudriere jail ${jail_name} not found, creating..." | tee -a ${LOGFILE}
|
2274
|
_create_or_update="-c -v ${FREEBSD_PARENT_BRANCH} -a ${jail_arch} -m svn"
|
2275
|
_create_or_update_text="Creating"
|
2276
|
fi
|
2277
|
|
2278
|
if [ "${jail_arch}" = "arm.armv6" ]; then
|
2279
|
native_xtools="-x"
|
2280
|
else
|
2281
|
native_xtools=""
|
2282
|
fi
|
2283
|
|
2284
|
echo -n ">>> ${_create_or_update_text} jail ${jail_name}, it may take some time... " | tee -a ${LOGFILE}
|
2285
|
if ! script -aq ${LOGFILE} poudriere jail ${_create_or_update} -j "${jail_name}" -P ${_jail_patch} ${native_xtools} >/dev/null 2>&1; then
|
2286
|
echo "" | tee -a ${LOGFILE}
|
2287
|
echo ">>> ERROR: Error ${_create_or_update_text} jail ${jail_name}, aborting..." | tee -a ${LOGFILE}
|
2288
|
print_error_pfS
|
2289
|
fi
|
2290
|
echo "Done!" | tee -a ${LOGFILE}
|
2291
|
done
|
2292
|
}
|
2293
|
|
2294
|
poudriere_update_ports() {
|
2295
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
2296
|
|
2297
|
# Create ports tree if necessary
|
2298
|
if ! poudriere ports -l | grep -q -E "^${POUDRIERE_PORTS_NAME}[[:blank:]]"; then
|
2299
|
poudriere_create_ports_tree
|
2300
|
else
|
2301
|
echo -n ">>> Resetting local changes on ports tree ${POUDRIERE_PORTS_NAME}... " | tee -a ${LOGFILE}
|
2302
|
script -aq ${LOGFILE} git -C "/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}" reset --hard >/dev/null 2>&1
|
2303
|
script -aq ${LOGFILE} git -C "/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}" clean -fd >/dev/null 2>&1
|
2304
|
echo "Done!" | tee -a ${LOGFILE}
|
2305
|
echo -n ">>> Updating ports tree ${POUDRIERE_PORTS_NAME}... " | tee -a ${LOGFILE}
|
2306
|
script -aq ${LOGFILE} poudriere ports -u -p "${POUDRIERE_PORTS_NAME}" >/dev/null 2>&1
|
2307
|
echo "Done!" | tee -a ${LOGFILE}
|
2308
|
poudriere_rename_ports
|
2309
|
fi
|
2310
|
}
|
2311
|
|
2312
|
poudriere_bulk() {
|
2313
|
local _archs=$(poudriere_possible_archs)
|
2314
|
|
2315
|
LOGFILE=${BUILDER_LOGS}/poudriere.log
|
2316
|
|
2317
|
if [ -z "${DO_NOT_UPLOAD}" -a -z "${PKG_RSYNC_HOSTNAME}" ]; then
|
2318
|
echo ">>> ERROR: PKG_RSYNC_HOSTNAME is not set"
|
2319
|
print_error_pfS
|
2320
|
fi
|
2321
|
|
2322
|
rm -f ${LOGFILE}
|
2323
|
|
2324
|
poudriere_create_ports_tree
|
2325
|
|
2326
|
[ -d /usr/local/etc/poudriere.d ] || \
|
2327
|
mkdir -p /usr/local/etc/poudriere.d
|
2328
|
|
2329
|
if [ -f "${BUILDER_TOOLS}/conf/pfPorts/make.conf" ]; then
|
2330
|
cp -f "${BUILDER_TOOLS}/conf/pfPorts/make.conf" /usr/local/etc/poudriere.d/${POUDRIERE_PORTS_NAME}-make.conf
|
2331
|
fi
|
2332
|
|
2333
|
# Change version of pfSense meta ports for snapshots
|
2334
|
if [ -z "${_IS_RELEASE}" ]; then
|
2335
|
local _meta_pkg_version="$(echo "${PRODUCT_VERSION}" | sed 's,DEVELOPMENT,ALPHA,')-${DATESTRING}"
|
2336
|
sed -i '' \
|
2337
|
-e "/^DISTVERSION/ s,^.*,DISTVERSION= ${_meta_pkg_version}," \
|
2338
|
-e "/^PORTREVISION=/d" \
|
2339
|
/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}/security/${PRODUCT_NAME}/Makefile
|
2340
|
fi
|
2341
|
|
2342
|
for jail_arch in ${_archs}; do
|
2343
|
jail_name=$(poudriere_jail_name ${jail_arch})
|
2344
|
|
2345
|
if ! poudriere jail -i -j "${jail_name}" >/dev/null 2>&1; then
|
2346
|
echo ">>> Poudriere jail ${jail_name} not found, skipping..." | tee -a ${LOGFILE}
|
2347
|
continue
|
2348
|
fi
|
2349
|
|
2350
|
if [ -f "${POUDRIERE_BULK}.${jail_arch}" ]; then
|
2351
|
_ref_bulk="${POUDRIERE_BULK}.${jail_arch}"
|
2352
|
else
|
2353
|
_ref_bulk="${POUDRIERE_BULK}"
|
2354
|
fi
|
2355
|
|
2356
|
_bulk=${SCRATCHDIR}/poudriere_bulk.${POUDRIERE_BRANCH}
|
2357
|
sed -e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" ${_ref_bulk} > ${_bulk}
|
2358
|
|
2359
|
if ! poudriere bulk -f ${_bulk} -j ${jail_name} -p ${POUDRIERE_PORTS_NAME}; then
|
2360
|
echo ">>> ERROR: Something went wrong..."
|
2361
|
print_error_pfS
|
2362
|
fi
|
2363
|
|
2364
|
echo ">>> Cleaning up old packages from repo..."
|
2365
|
if ! poudriere pkgclean -f ${_bulk} -j ${jail_name} -p ${POUDRIERE_PORTS_NAME} -y; then
|
2366
|
echo ">>> ERROR: Something went wrong..."
|
2367
|
print_error_pfS
|
2368
|
fi
|
2369
|
|
2370
|
pkg_repo_rsync "/usr/local/poudriere/data/packages/${jail_name}-${POUDRIERE_PORTS_NAME}"
|
2371
|
done
|
2372
|
}
|
2373
|
|
2374
|
# This routine is called to write out to stdout
|
2375
|
# a string. The string is appended to $SNAPSHOTSLOGFILE
|
2376
|
# and we scp the log file to the builder host if
|
2377
|
# needed for the real time logging functions.
|
2378
|
snapshots_update_status() {
|
2379
|
if [ -z "$1" ]; then
|
2380
|
return
|
2381
|
fi
|
2382
|
if [ -z "${SNAPSHOTS}" -a -z "${POUDRIERE_SNAPSHOTS}" ]; then
|
2383
|
return
|
2384
|
fi
|
2385
|
echo "$*"
|
2386
|
echo "`date` -|- $*" >> $SNAPSHOTSLOGFILE
|
2387
|
if [ -z "${DO_NOT_UPLOAD}" -a -n "${SNAPSHOTS_RSYNCIP}" ]; then
|
2388
|
LU=$(cat $SNAPSHOTSLASTUPDATE 2>/dev/null)
|
2389
|
CT=$(date "+%H%M%S")
|
2390
|
# Only update every minute
|
2391
|
if [ "$LU" != "$CT" ]; then
|
2392
|
ssh ${SNAPSHOTS_RSYNCUSER}@${SNAPSHOTS_RSYNCIP} \
|
2393
|
"mkdir -p ${SNAPSHOTS_RSYNCLOGS}"
|
2394
|
scp -q $SNAPSHOTSLOGFILE \
|
2395
|
${SNAPSHOTS_RSYNCUSER}@${SNAPSHOTS_RSYNCIP}:${SNAPSHOTS_RSYNCLOGS}/build.log
|
2396
|
date "+%H%M%S" > $SNAPSHOTSLASTUPDATE
|
2397
|
fi
|
2398
|
fi
|
2399
|
}
|
2400
|
|
2401
|
# Copy the current log file to $filename.old on
|
2402
|
# the snapshot www server (real time logs)
|
2403
|
snapshots_rotate_logfile() {
|
2404
|
if [ -z "${DO_NOT_UPLOAD}" -a -n "${SNAPSHOTS_RSYNCIP}" ]; then
|
2405
|
scp -q $SNAPSHOTSLOGFILE \
|
2406
|
${SNAPSHOTS_RSYNCUSER}@${SNAPSHOTS_RSYNCIP}:${SNAPSHOTS_RSYNCLOGS}/build.log.old
|
2407
|
fi
|
2408
|
|
2409
|
# Cleanup log file
|
2410
|
rm -f $SNAPSHOTSLOGFILE; touch $SNAPSHOTSLOGFILE
|
2411
|
rm -f $SNAPSHOTSLASTUPDATE; touch $SNAPSHOTSLASTUPDATE
|
2412
|
|
2413
|
}
|
2414
|
|
2415
|
create_sha256() {
|
2416
|
local _file="${1}"
|
2417
|
|
2418
|
if [ ! -f "${_file}" ]; then
|
2419
|
return 1
|
2420
|
fi
|
2421
|
|
2422
|
( \
|
2423
|
cd $(dirname ${_file}) && \
|
2424
|
sha256 $(basename ${_file}) > $(basename ${_file}).sha256 \
|
2425
|
)
|
2426
|
}
|
2427
|
|
2428
|
snapshots_create_latest_symlink() {
|
2429
|
local _image="${1}"
|
2430
|
|
2431
|
if [ -z "${_image}" ]; then
|
2432
|
return
|
2433
|
fi
|
2434
|
|
2435
|
if [ -z "${TIMESTAMP_SUFFIX}" ]; then
|
2436
|
return
|
2437
|
fi
|
2438
|
|
2439
|
if [ ! -f "${_image}" ]; then
|
2440
|
return
|
2441
|
fi
|
2442
|
|
2443
|
local _symlink=$(echo ${_image} | sed "s,${TIMESTAMP_SUFFIX},-latest,")
|
2444
|
ln -sf $(basename ${_image}) ${_symlink}
|
2445
|
ln -sf $(basename ${_image}).sha256 ${_symlink}.sha256
|
2446
|
}
|
2447
|
|
2448
|
snapshots_copy_to_staging_nanobsd() {
|
2449
|
for NANOTYPE in nanobsd nanobsd-vga; do
|
2450
|
for FILESIZE in ${1}; do
|
2451
|
FILENAMEFULL="$(nanobsd_image_filename ${FILESIZE} ${NANOTYPE}).gz"
|
2452
|
FILENAMEUPGRADE="$(nanobsd_image_filename ${FILESIZE} ${NANOTYPE} 1).gz"
|
2453
|
mkdir -p $STAGINGAREA/nanobsd
|
2454
|
mkdir -p $STAGINGAREA/nanobsdupdates
|
2455
|
|
2456
|
cp -l $IMAGES_FINAL_DIR/$FILENAMEFULL $STAGINGAREA/nanobsd/ 2>/dev/null
|
2457
|
cp -l $IMAGES_FINAL_DIR/$FILENAMEUPGRADE $STAGINGAREA/nanobsdupdates 2>/dev/null
|
2458
|
|
2459
|
if [ -f $STAGINGAREA/nanobsd/$FILENAMEFULL ]; then
|
2460
|
create_sha256 $STAGINGAREA/nanobsd/$FILENAMEFULL
|
2461
|
fi
|
2462
|
if [ -f $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE ]; then
|
2463
|
create_sha256 $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE
|
2464
|
fi
|
2465
|
|
2466
|
# Copy NanoBSD auto update:
|
2467
|
if [ -f $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE ]; then
|
2468
|
cp -l $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE $STAGINGAREA/latest-${NANOTYPE}-$FILESIZE.img.gz 2>/dev/null
|
2469
|
create_sha256 $STAGINGAREAA/latest-${NANOTYPE}-$FILESIZE.img.gz
|
2470
|
# NOTE: Updates need a file with output similar to date output
|
2471
|
# Use the file generated at start of snapshots_dobuilds() to be consistent on times
|
2472
|
cp $BUILTDATESTRINGFILE $STAGINGAREA/version-${NANOTYPE}-$FILESIZE
|
2473
|
fi
|
2474
|
done
|
2475
|
done
|
2476
|
}
|
2477
|
|
2478
|
snapshots_copy_to_staging_iso_updates() {
|
2479
|
local _img=""
|
2480
|
|
2481
|
for _img in ${ISOPATH} ${MEMSTICKPATH} ${MEMSTICKSERIALPATH} ${MEMSTICKADIPATH}; do
|
2482
|
if [ ! -f "${_img}.gz" ]; then
|
2483
|
continue
|
2484
|
fi
|
2485
|
_img="${_img}.gz"
|
2486
|
create_sha256 ${_img}
|
2487
|
cp -l ${_img}* $STAGINGAREA/ 2>/dev/null
|
2488
|
snapshots_create_latest_symlink ${STAGINGAREA}/$(basename ${_img})
|
2489
|
done
|
2490
|
|
2491
|
if [ -f "${UPDATES_TARBALL_FILENAME}" ]; then
|
2492
|
create_sha256 ${UPDATES_TARBALL_FILENAME}
|
2493
|
cp -l ${UPDATES_TARBALL_FILENAME}* $STAGINGAREA/ 2>/dev/null
|
2494
|
snapshots_create_latest_symlink ${STAGINGAREA}/$(basename ${UPDATES_TARBALL_FILENAME})
|
2495
|
fi
|
2496
|
|
2497
|
if [ -f "${OVAPATH}" ]; then
|
2498
|
mkdir -p ${STAGINGAREA}/virtualization
|
2499
|
create_sha256 ${OVAPATH}
|
2500
|
cp -l ${OVAPATH}* $STAGINGAREA/virtualization 2>/dev/null
|
2501
|
snapshots_create_latest_symlink ${STAGINGAREA}/virtualization/$(basename ${OVAPATH})
|
2502
|
fi
|
2503
|
|
2504
|
# NOTE: Updates need a file with output similar to date output
|
2505
|
# Use the file generated at start of snapshots_dobuilds() to be consistent on times
|
2506
|
if [ -z "${_IS_RELEASE}" ]; then
|
2507
|
cp $BUILTDATESTRINGFILE $STAGINGAREA/version 2>/dev/null
|
2508
|
fi
|
2509
|
}
|
2510
|
|
2511
|
snapshots_scp_files() {
|
2512
|
if [ -z "${RSYNC_COPY_ARGUMENTS}" ]; then
|
2513
|
RSYNC_COPY_ARGUMENTS="-ave ssh --timeout=60 --bwlimit=${RSYNCKBYTELIMIT}" #--bwlimit=50
|
2514
|
fi
|
2515
|
|
2516
|
snapshots_update_status ">>> Copying core pkg repo to ${PKG_RSYNC_HOSTNAME}"
|
2517
|
pkg_repo_rsync "${CORE_PKG_PATH}"
|
2518
|
snapshots_update_status ">>> Finished copying core pkg repo"
|
2519
|
|
2520
|
snapshots_update_status ">>> Copying files to ${RSYNCIP}"
|
2521
|
|
2522
|
# Ensure directory(s) are available
|
2523
|
ssh ${RSYNCUSER}@${RSYNCIP} "mkdir -p ${RSYNCPATH}/installer"
|
2524
|
ssh ${RSYNCUSER}@${RSYNCIP} "mkdir -p ${RSYNCPATH}/updates"
|
2525
|
ssh ${RSYNCUSER}@${RSYNCIP} "mkdir -p ${RSYNCPATH}/nanobsd"
|
2526
|
if [ -d $STAGINGAREA/virtualization ]; then
|
2527
|
ssh ${RSYNCUSER}@${RSYNCIP} "mkdir -p ${RSYNCPATH}/virtualization"
|
2528
|
fi
|
2529
|
ssh ${RSYNCUSER}@${RSYNCIP} "mkdir -p ${RSYNCPATH}/.updaters"
|
2530
|
# ensure permissions are correct for r+w
|
2531
|
ssh ${RSYNCUSER}@${RSYNCIP} "chmod -R ug+rw ${RSYNCPATH}/."
|
2532
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/${PRODUCT_NAME}${PRODUCT_NAME_SUFFIX}-*iso* \
|
2533
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/installer/
|
2534
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/${PRODUCT_NAME}${PRODUCT_NAME_SUFFIX}-memstick* \
|
2535
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/installer/
|
2536
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/${PRODUCT_NAME}${PRODUCT_NAME_SUFFIX}-*Update* \
|
2537
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/updates/
|
2538
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/nanobsd/* \
|
2539
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/nanobsd/
|
2540
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/nanobsdupdates/* \
|
2541
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/updates/
|
2542
|
if [ -d $STAGINGAREA/virtualization ]; then
|
2543
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/virtualization/* \
|
2544
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/virtualization/
|
2545
|
fi
|
2546
|
|
2547
|
# Rather than copy these twice, use ln to link to the latest one.
|
2548
|
|
2549
|
ssh ${RSYNCUSER}@${RSYNCIP} "rm -f ${RSYNCPATH}/.updaters/latest.tgz"
|
2550
|
ssh ${RSYNCUSER}@${RSYNCIP} "rm -f ${RSYNCPATH}/.updaters/latest.tgz.sha256"
|
2551
|
|
2552
|
LATESTFILENAME=$(basename ${UPDATES_TARBALL_FILENAME})
|
2553
|
ssh ${RSYNCUSER}@${RSYNCIP} "ln -s ${RSYNCPATH}/updates/${LATESTFILENAME} \
|
2554
|
${RSYNCPATH}/.updaters/latest.tgz"
|
2555
|
ssh ${RSYNCUSER}@${RSYNCIP} "ln -s ${RSYNCPATH}/updates/${LATESTFILENAME}.sha256 \
|
2556
|
${RSYNCPATH}/.updaters/latest.tgz.sha256"
|
2557
|
|
2558
|
for i in ${FLASH_SIZE}
|
2559
|
do
|
2560
|
ssh ${RSYNCUSER}@${RSYNCIP} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz"
|
2561
|
ssh ${RSYNCUSER}@${RSYNCIP} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz.sha256"
|
2562
|
ssh ${RSYNCUSER}@${RSYNCIP} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz"
|
2563
|
ssh ${RSYNCUSER}@${RSYNCIP} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz.sha256"
|
2564
|
|
2565
|
FILENAMEUPGRADE="$(nanobsd_image_filename ${i} nanobsd 1).gz"
|
2566
|
ssh ${RSYNCUSER}@${RSYNCIP} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE} \
|
2567
|
${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz"
|
2568
|
ssh ${RSYNCUSER}@${RSYNCIP} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE}.sha256 \
|
2569
|
${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz.sha256"
|
2570
|
|
2571
|
FILENAMEUPGRADE="$(nanobsd_image_filename ${i} nanobsd-vga 1).gz"
|
2572
|
ssh ${RSYNCUSER}@${RSYNCIP} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE} \
|
2573
|
${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz"
|
2574
|
ssh ${RSYNCUSER}@${RSYNCIP} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE}.sha256 \
|
2575
|
${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz.sha256"
|
2576
|
done
|
2577
|
|
2578
|
rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/version* \
|
2579
|
${RSYNCUSER}@${RSYNCIP}:${RSYNCPATH}/.updaters
|
2580
|
snapshots_update_status ">>> Finished copying files."
|
2581
|
}
|